Login / Signup
Robust network construction against intentional attacks.
Hui Wang
Wanyun Cui
Yanghua Xiao
Hanghang Tong
Published in:
BigComp (2015)
Keyphrases
</>
watermarking technique
digital image watermarking
real time
information retrieval
computationally efficient
countermeasures
watermarking method
neural network
computer vision
digital images
parameter tuning
security protocols
malicious attacks
geometric attacks
robust watermarking scheme