[1]
W. . Rehman, A. . Khan, and B. . Ahmad, “Analysis of Vulnerability of Keys in a Watermarking System for Attack Susceptibility: Vulnerability of Keys in a Watermarking System”, PPASA, vol. 54, no. 1, pp. 55–70, Apr. 2021.