Continuous Authentication against Collusion Attacks.
Pin LyuWandong CaiYao WangPublished in: Sensors (2022)
Keyphrases
- security mechanisms
- semi fragile watermarking
- countermeasures
- digital watermarking
- detect malicious
- identity authentication
- biometric authentication
- terrorist attacks
- access control
- watermarking scheme
- watermarking algorithm
- computer security
- user authentication
- authentication scheme
- security threats
- chosen plaintext