Login / Signup
Two different approaches for attacking BOWS.
Pedro Comesaña
Fernando Pérez-González
Published in:
Security, Steganography, and Watermarking of Multimedia Contents (2007)
Keyphrases
</>
real time
trade off
information technology
strengths and weaknesses
computer vision
feature space
alternative approaches