Login / Signup

Thwarting cryptanalytic attacks based on the correlation function.

Roger TauleigneOctaviana DatcuMihai Stanciu
Published in: COMM (2014)
Keyphrases
  • correlation function
  • fourier transform
  • linear combination
  • linear relationship
  • brute force
  • image sequences
  • watermarking scheme
  • signal processing