Return to Article Details Encryption and Authentication of Works of Art Based on Network Security Download Download PDF