Login / Signup

New Approaches to Traitor Tracing with Embedded Identities.

Rishab GoyalVenkata KoppulaBrent Waters
Published in: TCC (2) (2019)
Keyphrases
  • strengths and weaknesses
  • real world
  • genetic algorithm
  • image processing
  • image segmentation
  • bayesian networks
  • wide range
  • digital images
  • alternative approaches