Login / Signup
Authentication with distortion criteria.
Emin Martinian
Gregory W. Wornell
Brian Chen
Published in:
IEEE Trans. Inf. Theory (2005)
Keyphrases
</>
evaluation criteria
error propagation
selection criteria
image sequences
multi criteria
vector quantizer
security analysis
digital watermarking
authentication protocol
authentication scheme
identity authentication