Login / Signup

Run-Time Randomization to Mitigate Tampering.

Bertrand AnckaertMariusz H. JakubowskiRamarathnam VenkatesanKoen De Bosschere
Published in: IWSEC (2007)
Keyphrases
  • digital images
  • privacy preserving
  • reverse engineering
  • privacy preserving association rule mining
  • database
  • e learning
  • neural network
  • real world
  • data mining
  • image processing
  • image compression
  • image authentication