Login / Signup

Covert Communication and Image Authentication Algorithm Based on Adversarial Examples.

Qiwen WuZijing FengYingkai HuangJiehui ZhongXiaolong Liu
Published in: ISCIT (2022)
Keyphrases
  • image processing
  • video sequences
  • image authentication