On the Security of Chaos-Based Watermarking Scheme for Secure Communication.
Musheer AhmadHamed D. Al-SharariPublished in: FICTA (1) (2016)
Keyphrases
- secure communication
- watermarking scheme
- chaotic systems
- smart card
- security protocols
- digital watermarking
- digital signature
- key management
- watermarking algorithm
- secret key
- secret sharing
- network security
- jpeg compression
- copyright protection
- error correction
- watermarking technique
- public key
- ad hoc networks
- geometric distortions
- information security
- security requirements
- security analysis
- initial conditions
- security mechanisms
- key technologies
- secret sharing scheme
- adaptive control
- encryption algorithm
- authentication protocol
- cryptographic protocols