All Stories

  1. Extract features using Zernike Moment to generate symmetric encryption key with polynomial interpolations