Public key encryption resilient to leakage and tampering attacks.
Shifeng SunDawu GuUdaya ParampalliYu YuBaodong QinPublished in: J. Comput. Syst. Sci. (2017)
Keyphrases
- public key encryption
- watermarking scheme
- detecting malicious
- information leakage
- digital images
- robust watermarking scheme
- proxy re encryption
- copyright protection
- watermarking technique
- public key
- watermarking algorithm
- digital watermarking
- jpeg compression
- watermark embedding
- encryption scheme
- security mechanisms
- standard model
- authentication scheme
- ddos attacks
- keywords