C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Covert Communication and Image Authentication Algorithm Based on Adversarial Examples.
Qiwen Wu
Zijing Feng
Yingkai Huang
Jiehui Zhong
Xiaolong Liu
Published in:
ISCIT (2022)
Keyphrases
</>
image processing
video sequences
image authentication