Figure 5From: On the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic ProtocolThe image quality for the scaling values and when and .Back to article page