Login / Signup
Covert Communication and Image Authentication Algorithm Based on Adversarial Examples.
Qiwen Wu
Zijing Feng
Yingkai Huang
Jiehui Zhong
Xiaolong Liu
Published in:
ISCIT (2022)
Keyphrases
</>
image processing
video sequences
image authentication