default search action
"Covert Communication and Image Authentication Algorithm Based on ..."
Qiwen Wu et al. (2022)
- Qiwen Wu, Zijing Feng, Yingkai Huang, Jiehui Zhong, Xiaolong Liu:
Covert Communication and Image Authentication Algorithm Based on Adversarial Examples. ISCIT 2022: 199-203
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.