Login / Signup
Structured Coding for Authentication in the Presence of a Malicious Adversary.
Allison Beemer
Oliver Kosut
Jörg Kliewer
Eric Graves
Paul L. Yu
Published in:
ISIT (2019)
Keyphrases
</>
detect malicious
coding scheme
semi fragile watermarking
coding method
structured data
inter frame
authentication protocol
biometric authentication
real world
image compression
coding efficiency
digital watermarking
authentication scheme
identity authentication
data encryption
integrity verification