Login / Signup
Return of ambiguity attacks.
Scott Craver
Published in:
Security and Watermarking of Multimedia Contents (2002)
Keyphrases
</>
countermeasures
malicious attacks
watermarking scheme
watermarking algorithm
attack detection
denial of service attacks
security protocols
traffic analysis
terrorist attacks
security problems
chosen plaintext
security flaws
malicious users
neural network
image watermarking
lightweight
case study