Substitution Attacks against Message Authentication.
Marcel ArmourBertram PoetteringPublished in: IACR Cryptol. ePrint Arch. (2019)
Keyphrases
- security mechanisms
- semi fragile watermarking
- digital watermarking
- detect malicious
- watermarking scheme
- image authentication
- countermeasures
- biometric authentication
- security threats
- security issues
- biometric template
- resource constrained
- access control
- security requirements
- security risks
- authentication scheme
- user authentication
- copyright protection
- security analysis
- identity management
- watermark extraction
- computer security
- session initiation protocol
- message delivery
- watermarking technique
- fragile watermarking