Login / Signup
An experimental study of attacks on the availability of Glossy.
Kasun Hewage
Shahid Raza
Thiemo Voigt
Published in:
Comput. Electr. Eng. (2015)
Keyphrases
</>
countermeasures
watermarking scheme
security threats
malicious attacks
image watermarking
data sets
cooperative
curved surfaces
computer security
security risks
chosen plaintext
ddos attacks
data replication
block cipher
security vulnerabilities
digital image watermarking