Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach

Add code
Jun 25, 2022
Figure 1 for Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Figure 2 for Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Figure 3 for Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Figure 4 for Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: