Skip to main content
Search
Get published
Explore Journals
Books
About
My account
Search all SpringerOpen articles
Search
EURASIP Journal on Image and Video Processing
About
Articles
Submission Guidelines
Table 2 Watermark verification results of owner’s legal trigger set and attacker’s forged trigger set
From:
Secure neural network watermarking protocol against forging attack
N
L
τ
t
owner
t
forged
10
38
36
38
3.4
100
20
18
20
0.4
Back to article page