Skip to main content
Figure 1 | EURASIP Journal on Information Security

Figure 1

From: Broken Arrows

Figure 1

The different processes and entities involved in the BA embedding scheme. Each couple represents the name and size of the vector a.

Back to article page