Covert Authentication Against a Myopic Adversary.
Meng-Che ChangMatthieu R. BlochPublished in: ISIT (2021)
Keyphrases
- information flow
- biometric authentication
- security mechanisms
- user authentication
- authentication protocol
- authentication mechanism
- image authentication
- semi fragile watermarking
- data encryption
- identity authentication
- security analysis
- brute force
- information gain
- bounded rationality
- dynamic programming
- decision trees
- authentication scheme
- identity management
- digital images
- learning algorithm