Time-Frequency Analysis for Second-Order Attacks.
Pierre BelgarricShivam BhasinNicolas BruneauJean-Luc DangerNicolas DebandeSylvain GuilleyAnnelie HeuserZakaria NajmOlivier RioulPublished in: CARDIS (2013)
Keyphrases
- non stationary
- malicious attacks
- countermeasures
- higher order
- watermarking scheme
- traffic analysis
- malicious users
- denial of service attacks
- security risks
- data publishing
- security threats
- image watermarking
- watermarking technique
- digital images
- fourth order
- data sets
- security protocols
- computer security
- terrorist attacks
- data mining