Login / Signup
Invisible Adaptive Attacks.
Jesper Buus Nielsen
Mario Strefler
Published in:
IACR Cryptol. ePrint Arch. (2014)
Keyphrases
</>
website
data driven
data sets
image processing
case study
digital images
watermarking scheme
countermeasures
malicious users