Sign in

Two different approaches for attacking BOWS.

Pedro ComesañaFernando Pérez-González
Published in: Security, Steganography, and Watermarking of Multimedia Contents (2007)
Keyphrases
  • real time
  • trade off
  • information technology
  • strengths and weaknesses
  • computer vision
  • feature space
  • alternative approaches