Keyphrases
- anomaly detection
- biometric authentication
- identity authentication
- fragile watermarking
- security analysis
- user authentication
- image authentication
- security mechanisms
- authentication protocol
- authentication scheme
- semi fragile watermarking
- real time
- authentication mechanism
- data encryption
- trust relationships
- ad hoc networks
- low cost