Login / Signup
Realization of correlation attack against the fuzzy vault scheme.
Alisher Kholmatov
Berrin A. Yanikoglu
Published in:
Security, Forensics, Steganography, and Watermarking of Multimedia Contents (2008)
Keyphrases
</>
fuzzy vault
image processing
secret key