Tampering Attacks in Pairing-Based Cryptography.
Johannes BlömerPeter GüntherGennadij LiskePublished in: FDTC (2014)
Keyphrases
- watermarking scheme
- cryptographic algorithms
- robust watermarking scheme
- malicious attacks
- detecting malicious
- cellular automata
- digital images
- transform domain
- security protocols
- reverse engineering
- countermeasures
- elliptic curve cryptography
- jpeg compression
- watermark embedding
- copyright protection
- forensic analysis
- authentication scheme
- watermarking technique
- information security
- digital watermarking
- spread spectrum
- cryptographic protocols
- computer security
- security threats
- image authentication
- watermarking algorithm
- error correction
- spatial domain
- detect malicious
- signal processing