Figure 7From: On the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic Protocol The average correlation value after averaging collusion attack for the number of colluders when Back to article page