Sign in

Everyone Can Attack: Repurpose Lossy Compression as a Natural Backdoor Attack.

Sze Jue YangQuang NguyenChee Seng ChanKhoa Doan
Published in: CoRR (2023)
Keyphrases
  • lossy compression
  • digital watermark
  • lossless compression
  • image quality
  • image processing
  • secret key
  • digital images