New Results on Boomerang and Rectangle Attacks.
Eli BihamOrr DunkelmanNathan KellerPublished in: FSE (2002)
Keyphrases
- countermeasures
- computer security
- watermarking scheme
- security threats
- hough transform
- malicious attacks
- denial of service attacks
- image watermarking
- dos attacks
- security protocols
- watermarking algorithm
- block size
- traffic analysis
- data publishing
- security risks
- line segments
- database
- attack detection
- axis parallel
- security flaws