Optimized Interpolation Attacks on LowMC.
Itai DinurYunwen LiuWilli MeierQingju WangPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- countermeasures
- malicious users
- watermarking scheme
- security threats
- piecewise polynomial
- digital image watermarking
- watermarking algorithm
- security mechanisms
- malicious attacks
- denial of service attacks
- interpolation methods
- detect malicious
- data publishing
- traffic analysis
- data sets
- linear interpolation
- image interpolation
- multiresolution
- genetic algorithm
- neural network