Return to Article Details Decomposition of an Image Cryptography Scheme That One Based On or Its Transformed Version to Be Watermarked Download Download PDF