Login / Signup
Thwarting cryptanalytic attacks based on the correlation function.
Roger Tauleigne
Octaviana Datcu
Mihai Stanciu
Published in:
COMM (2014)
Keyphrases
</>
correlation function
fourier transform
linear combination
linear relationship
brute force
image sequences
watermarking scheme
signal processing