Login / Signup

Realization of correlation attack against the fuzzy vault scheme.

Alisher KholmatovBerrin A. Yanikoglu
Published in: Security, Forensics, Steganography, and Watermarking of Multimedia Contents (2008)
Keyphrases
  • fuzzy vault
  • image processing
  • secret key