Security analysis on add-SS watermarking with GSM

被引:0
|
作者
School of Information Science and Technology, Sun Yat-Sen University, Guangzhou 510275, China [1 ]
不详 [2 ]
机构
来源
Zidonghua Xuebao Acta Auto. Sin. | 2009年 / 7卷 / 841-850期
关键词
Mixtures;
D O I
10.3724/SP.J.1004.2009.00841
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Communication Security in GSM Networks
    Bouska, Petr
    Drahansky, Martin
    SECTECH: 2008 INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, : 248 - 251
  • [22] Solutions to the GSM Security Weaknesses
    Toorani, Mohsen
    Shirazi, Ali Asghar Beheshti
    NGMAST 2008: SECOND INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES, AND TECHNOLOGIES, PROCEEDINGS, 2008, : 576 - 581
  • [23] GSM: Security, services, and the SIM
    Vedder, K
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 224 - 240
  • [24] GSM security issues and challenges
    Siddique, S. Muhammad
    Amir, Muhammad
    SNPD 2006: SEVENTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 413 - +
  • [25] A contemporary foreword on GSM security
    Pagliusi, PS
    INFRASTUCTURE SECURITY, PROCEEDINGS, 2002, 2437 : 129 - 144
  • [26] Investigating Vulnerabilities in GSM Security
    Pannu, Mandeep
    Bird, Robert
    Gill, Bob
    Patel, Kiran
    2015 INTERNATIONAL CONFERENCE AND WORKSHOP ON COMPUTING AND COMMUNICATION (IEMCON), 2015,
  • [27] Correspondent authorization in the GSM telephony using watermarking technology
    Gajewski, Piotr
    Piotrowski, Zbigniew
    2006 EUROPEAN CONFERENCE ON WIRELESS TECHNOLOGIES, 2006, : 150 - +
  • [28] A theoretical study of watermarking security
    Cayre, F
    Fontaine, C
    Furon, T
    2005 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), VOLS 1 AND 2, 2005, : 1868 - 1872
  • [29] Medical images, security and watermarking
    Coatrieux, G
    Maître, H
    ANNALS OF TELECOMMUNICATIONS, 2003, 58 (5-6) : 782 - 800
  • [30] Security Scheme for Digital Watermarking
    Xiao Jun
    Wang Ying
    Li Dengyu
    Zhang Ying
    Zhu Li
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 335 - 339