A steganographic approach to mitigate password attacks.
Isha PandyaSurmeet JhajjRenuka PawarPublished in: ICACCI (2017)
Keyphrases
- countermeasures
- information security
- spatial domain
- spread spectrum
- digital images
- malicious users
- malicious attacks
- watermarking algorithm
- watermarking scheme
- dct domain
- security mechanisms
- security threats
- computer security
- watermarking technique
- information hiding
- user authentication
- cryptographic protocols
- watermarking method