论文部分内容阅读
Based on the principles of the visual cryptography and the law of large numbers, the unexpanded shares are generated during the processes of embedding and verifying the hidden watermark. The watermark embedding is done in the frequency domain, which can b