• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Covert Communication and Image Authentication Algorithm Based on Adversarial Examples.

Qiwen WuZijing FengYingkai HuangJiehui ZhongXiaolong Liu
Published in: ISCIT (2022)
Keyphrases
  • image processing
  • video sequences
  • image authentication