Public Key Encryption Resilient to Post-challenge Leakage and Tampering Attacks.
Suvradip ChakrabortyC. Pandu RanganPublished in: CT-RSA (2019)
Keyphrases
- watermarking scheme
- public key encryption
- digital images
- information leakage
- robust watermarking scheme
- copyright protection
- detecting malicious
- watermarking algorithm
- digital watermarking
- proxy re encryption
- jpeg compression
- security protocols
- watermark embedding
- watermarking method
- watermarking technique
- low cost
- multiresolution