Login / Signup

Distinguishing Attacks on LPMAC Based on the Full RIPEMD and Reduced-Step RIPEMD-{256, 320}.

Gaoli Wang
Published in: Inscrypt (2010)
Keyphrases
  • post processing
  • countermeasures
  • databases
  • watermarking scheme
  • database
  • data sets
  • machine learning
  • knowledge base
  • multiscale
  • digital images
  • computer security
  • security threats
  • malicious attacks