Login / Signup
Coding Theorems for a (2, 2)-Threshold Scheme With Detectability of Impersonation Attacks.
Mitsugu Iwamoto
Hiroki Koga
Hirosuke Yamamoto
Published in:
IEEE Trans. Inf. Theory (2012)
Keyphrases
</>
security analysis
coding scheme
progressive transmission
smart card
authentication protocol
chosen plaintext
image quality
error control
image watermarking scheme
authentication scheme
security requirements
watermarking technique
quantization scheme
signcryption scheme
bit rate reduction