Keyphrases
- upper bound
- lower bound
- rate distortion theory
- biometric authentication
- fragile watermarking scheme
- authentication scheme
- lower and upper bounds
- vc dimension
- upper and lower bounds
- security analysis
- vector quantizer
- session initiation protocol
- radially symmetric
- learning algorithm
- error propagation
- user authentication
- information loss
- identity management
- data encryption
- worst case
- integrity verification
- fragile watermarking