Forgery Attacks on FlexAE and FlexAEAD.
Maria EichlsederDaniel KalesMarkus SchofneggerPublished in: IACR Cryptol. ePrint Arch. (2019)
Keyphrases
- countermeasures
- digital images
- traffic analysis
- malicious attacks
- chosen plaintext
- watermarking scheme
- cooperative
- watermarking algorithm
- watermarking technique
- computer security
- neural network
- signature verification
- image watermarking
- security threats
- security risks
- security protocols
- cryptographic protocols
- web services