Skip to Search
Skip to Navigation
Skip to Main Content
Skip to Footer
About Us
Library Branches
Ask a Librarian
Read with us
Book Series
CHILDREN BOOKS
READINGS IN CHILDREN'S LITERATURE - Cycle 1
READINGS IN CHILDREN'S LITERATURE - Cycle 2
READINGS IN CHILDREN'S LITERATURE - Cycle 3
READINGS IN CHILDREN'S LITERATURE - Recycling and Agriculture
Reading Buddies
Reading For All
Feedback
Manuscripts
Events
Calendar
Maktaba Competitions
Fun At Home: Activity Book
Little Writer in The Big Book Competition - Eleven Edition
Creative Reader Competition - 12th Edition
LIBRARY PIONEERS COMPETITION 2025
Forms
The Suppliers Platform
POD programs
Login | تسجيل الدخول
English
عربي
Login
Click Proceed to login using your library account or register as a new user
Staff Login
×
Login | تسجيل الدخول
English
عربي
Menu
menu
About Us
Library Branches
Ask a Librarian
Read with us
Book Series
CHILDREN BOOKS
READINGS IN CHILDREN'S LITERATURE - Cycle 1
READINGS IN CHILDREN'S LITERATURE - Cycle 2
READINGS IN CHILDREN'S LITERATURE - Cycle 3
READINGS IN CHILDREN'S LITERATURE - Recycling and Agriculture
Reading Buddies
Reading For All
Feedback
Manuscripts
Events
Calendar
Maktaba Competitions
Fun At Home: Activity Book
Little Writer in The Big Book Competition - Eleven Edition
Creative Reader Competition - 12th Edition
LIBRARY PIONEERS COMPETITION 2025
Forms
The Suppliers Platform
POD programs
Site Search
Search Options
Online Resources
Catalog & Resources
Maktaba Catalog
All
Author
Title
Subject
ISBN
Item request has been placed!
×
Item request cannot be made.
×
Processing Request
Preventing Cheating in Computational Visual Cryptography.
Item request has been placed!
×
Item request cannot be made.
×
Processing Request
Read Online
Read More
Add to Saved list
Author(s):
Chin-Chen Chang
1
;
Tzung-Her Chen
2
;
Li-Jen Liu
2
Source:
Fundamenta Informaticae
. 2009, Vol. 92 Issue 1-2, p27-42. 16p. 2 Black and White Photographs, 4 Diagrams, 3 Charts.
Comments
No Comments.
×
No Comments.