Figure 6From: On the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic ProtocolThe average correlation value after averaging collusion attack for the scaling values and .Back to article page