Achieving subspace or key security for WOA using natural or circular watermarking.
Patrick BasFrançois CayrePublished in: MM&Sec (2006)
Keyphrases
- high security
- principal component analysis
- digital images
- access control
- private key
- feature space
- network security
- security requirements
- data sets
- security policies
- secure communication
- real world
- high dimensional data
- watermarking scheme
- security issues
- data hiding
- information systems
- low dimensional
- hough transform
- image set
- statistical databases
- dimensionality reduction
- security analysis
- security protocols