Login / Signup
Augmenting LZ-77 with authentication and integrity assurance capabilities.
Mikhail J. Atallah
Stefano Lonardi
Published in:
Concurr. Pract. Exp. (2004)
Keyphrases
</>
integrity verification
fragile watermarking scheme
fragile watermarking
biometric authentication
integrity constraints
compression scheme
user authentication
image authentication
identity authentication
database integrity
operating system
security mechanisms
security analysis