1
کامپیوتر و شبکه::
حملۀ جعلکننده
A third one is counterfeiting attack which combines groups of different codestreams [60].
(4), this counterfeiting attack can not be launched either.
Memon, "Counterfeiting attacks on oblivious block- wise independent invisible watermarking schemes," IEEE Transactions on Image Processing, vol.9, no.3, pp.432-441, 2000.
واژگان شبکه مترجمین ایران