[1]
C. Vinitha and M. Azath, “Study On Image Authentication Techniques”, Int. J. Comp. Sci. Eng., vol. 2, no. 12, pp. 87–90, Dec. 2014.