Figure 1From: On the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic Protocol The transaction of the fingerprinting protocol. Back to article page