Login / Signup
Practical Security Analysis of Dirty Paper Trellis Watermarking.
Patrick Bas
Gwenaël J. Doërr
Published in:
Information Hiding (2007)
Keyphrases
</>
security analysis
smart card
high security
security requirements
public key
security properties
image encryption
databases
mutual authentication
authentication protocol
user authentication
digital images
encryption algorithm
encryption scheme
data hiding
coding scheme
software engineering
proxy signature scheme