Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations.
Jean-Sébastien CoronCraig GentryShai HaleviTancrède LepointHemanta K. MajiEric MilesMariana RaykovaAmit SahaiMehdi TibouchiPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- low level
- high level
- higher level
- low level features
- countermeasures
- visual information
- malicious attacks
- lower level
- visual features
- middle level
- security threats
- visual cues
- security protocols
- mid level
- database
- denial of service attacks
- traffic analysis
- figure ground
- computer security
- computer systems
- data mining
- database systems
- watermarking scheme
- cooperative
- image retrieval
- web applications
- access control