Three-Dimensional (3D) Polygon Mesh Authentication Using Sequential Bit Substitution Strategy
Crossref DOI link: https://doi.org/10.1007/978-981-13-8676-3_52
Published Online: 2019-08-18
Published Print: 2020
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Borah, Sagarika
Borah, Bhogeswar
Text and Data Mining valid from 2019-08-18
Chapter History
First Online: 18 August 2019