Measurement-driven Security Analysis of Imperceptible Impersonation Attacks.
Shasha LiKarim KhalilRameswar PandaChengyu SongSrikanth V. KrishnamurthyAmit K. Roy-ChowdhuryAnanthram SwamiPublished in: CoRR (2020)
Keyphrases
- security analysis
- watermarking scheme
- stream cipher
- password guessing
- smart card
- security requirements
- public key
- high security
- watermarking technique
- watermarking algorithm
- security model
- security mechanisms
- authentication protocol
- security properties
- defense mechanisms
- elliptic curve cryptography
- encryption algorithm
- image encryption
- jpeg compression
- copyright protection
- encryption scheme
- digital images
- user authentication
- data hiding
- authentication scheme
- bitstream