Optimized Interpolation Attacks on LowMC.
Itai DinurYunwen LiuWilli MeierQingju WangPublished in: ASIACRYPT (2) (2015)
Keyphrases
- malicious attacks
- countermeasures
- traffic analysis
- watermarking scheme
- attack detection
- computer security
- interpolation methods
- image watermarking
- detect malicious
- sparse sampling
- security risks
- linear interpolation
- database systems
- image interpolation
- security mechanisms
- watermarking algorithm
- intrusion detection
- signal processing