Authentication Against a Myopic Adversary.
Allison BeemerOliver KosutJörg KliewerEric GravesPaul L. YuPublished in: CNS (2019)
Keyphrases
- identity authentication
- security analysis
- brute force
- authentication scheme
- fragile watermarking
- data encryption
- biometric authentication
- image authentication
- digital watermarking
- identity management
- security mechanisms
- authentication mechanism
- database
- user authentication
- public key cryptography
- digital images
- data sets