A new approach to countering ambiguity attacks.
Husrev T. SencarQiming LiNasir D. MemonPublished in: MM&Sec (2007)
Keyphrases
- countermeasures
- differential power analysis
- computer security
- malicious attacks
- watermarking scheme
- digital image watermarking
- traffic analysis
- malicious users
- cryptographic protocols
- chosen plaintext
- real time
- stream cipher
- terrorist attacks
- security protocols
- watermarking technique
- security mechanisms
- neural network