Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers.
Jovan Dj. GolicLuke O'ConnorPublished in: EUROCRYPT (1994)
Keyphrases
- watermarking algorithm
- bayesian networks
- high speed
- blind watermarking
- vector space
- generative model
- probabilistic model
- malicious users
- watermark embedding
- correlation coefficient
- information hiding
- posterior probability
- security threats
- traffic analysis
- terrorist attacks
- power consumption
- watermarking scheme
- transform domain
- probability distribution
- data hiding
- probability theory
- watermarking technique
- image watermarking
- denial of service attacks
- digital images