Predicate encryption against master-key tampering attacks.
Yuejun LiuRui ZhangYongbin ZhouPublished in: Cybersecur. (2019)
Keyphrases
- watermarking scheme
- image authentication
- malicious attacks
- robust watermarking scheme
- detecting malicious
- stream cipher
- watermarking algorithm
- information hiding
- digital images
- jpeg compression
- copyright protection
- cryptographic algorithms
- forensic analysis
- cryptographic protocols
- digital watermarking
- watermark embedding
- tamper detection
- reverse engineering
- block cipher
- countermeasures
- watermarking technique
- transform domain
- image encryption
- authentication scheme
- digital watermark
- security protocols
- secret key
- advanced encryption standard
- elliptic curve cryptography
- spread spectrum
- first order logic
- encryption scheme
- error correction
- security properties
- encryption algorithm
- image watermarking
- ddos attacks
- public key
- integrity verification