Robustness Of Saak Transform Against Adversarial Attacks.
Thiyagarajan RamanathanAbinaya ManimaranSuya YouC.-C. Jay KuoPublished in: CoRR (2019)
Keyphrases
- digital image watermarking
- image watermarking scheme
- semi fragile watermarking
- countermeasures
- watermark extraction
- watermark embedding
- digital images
- watermarking scheme
- watermarked image
- neural network
- security protocols
- computational efficiency
- java card
- security risks
- computer security
- malicious users
- cooperative
- geometric attacks
- multi agent