Login / Signup
Distinguishing Attacks on LPMAC Based on the Full RIPEMD and Reduced-Step RIPEMD-{256, 320}.
Gaoli Wang
Published in:
Inscrypt (2010)
Keyphrases
</>
post processing
countermeasures
databases
watermarking scheme
database
data sets
machine learning
knowledge base
multiscale
digital images
computer security
security threats
malicious attacks