Login / Signup
Security analysis of robust perceptual hashing.
Oleksiy J. Koval
Sviatoslav Voloshynovskiy
Fokko Beekhof
Thierry Pun
Published in:
Security, Forensics, Steganography, and Watermarking of Multimedia Contents (2008)
Keyphrases
</>
security analysis
smart card
image encryption
security requirements
high security
public key
encryption scheme
security model
authentication protocol
encryption algorithm
user authentication
mutual authentication
data structure
authentication scheme
proxy signature scheme