Login / Signup
How to Combat Block Replacement Attacks?.
Gwenaël J. Doërr
Jean-Luc Dugelay
Published in:
Information Hiding (2005)
Keyphrases
</>
countermeasures
security protocols
malicious users
data sets
denial of service attacks
terrorist attacks
block wise
replacement policy
digital image watermarking
security vulnerabilities
attack detection
malicious attacks
image watermarking
dct coefficients
web pages
social networks
neural network