Login / Signup
Poster Abstract: An Experimental Study of Attacks on the Availability of Glossy.
Kasun Hewage
Thiemo Voigt
Published in:
REALWSN (2013)
Keyphrases
</>
countermeasures
high level
higher level
digital image watermarking
low level
anomaly detection
information security
watermarking scheme
computational power
curved surfaces
digital watermarking
attack detection
malicious users
data corruption