Login / Signup
Revisiting Leakage Abuse Attacks.
Laura Blackstone
Seny Kamara
Tarik Moataz
Published in:
NDSS (2020)
Keyphrases
</>
information leakage
countermeasures
watermarking scheme
security threats
denial of service attacks
malicious attacks
malicious users
personal information
watermarking algorithm
neural network
case study
sensitive information
security problems
digital image watermarking
information systems
security risks