Login / Signup
-Attacks.
Norihisa Isogai
Atsuko Miyaji
Masao Nonaka
Published in:
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2003)
Keyphrases
</>
countermeasures
malicious attacks
watermarking scheme
malicious users
computer security
databases
digital watermarking
digital image watermarking
traffic analysis
security threats
java card
cryptographic protocols
image watermarking
security mechanisms
watermarking algorithm
multiscale
learning algorithm