Login / Signup
Protecting Secret Data from Insider Attacks.
David Dagon
Wenke Lee
Richard J. Lipton
Published in:
Financial Cryptography (2005)
Keyphrases
</>
insider attacks
secret data
data hiding
data embedding
secret key
grayscale images
attack detection
insider threat
early detection
pixel values
error correction
access control
pseudorandom
cryptographic protocols
customer data
spatial domain
smart card
compressed images
computer simulation