Presentations and attacks, and spoofs, oh my.
Stephanie SchuckersPublished in: Image Vis. Comput. (2016)
Keyphrases
- countermeasures
- security threats
- malicious attacks
- watermarking scheme
- terrorist attacks
- multimedia
- watermarking algorithm
- malicious users
- security risks
- chosen plaintext
- detect malicious
- digital image watermarking
- security vulnerabilities
- denial of service attacks
- neural network
- security protocols
- computer systems
- data mining