Keyphrases
- authentication protocol
- generative model
- smart card
- information hiding
- anisotropic diffusion
- information security
- diffusion process
- jpeg images
- information diffusion
- discriminative learning
- public key
- high capacity
- hidden information
- rfid tags
- security analysis
- real time
- data management
- spread spectrum
- low cost
- social networks