Method for Detecting Vulnerability to Doubling Attacks.
Chong Hee KimJean-Jacques QuisquaterPublished in: ICICS (2008)
Keyphrases
- high precision
- similarity measure
- high accuracy
- significant improvement
- preprocessing
- clustering method
- evolutionary algorithm
- support vector machine
- feature set
- prior knowledge
- pairwise
- dynamic programming
- image quality
- computationally efficient
- support vector machine svm
- detection method
- synthetic data
- objective function