Keyphrases
Watermarking Scheme
92%
Image Watermarking
64%
Local Outlier Factor
57%
Watermarking
45%
Outlier Detection
42%
Color Image
42%
Copyright Protection
42%
Singular Value Decomposition
34%
Relevant Subspace
28%
Contextual Anomaly Detection
28%
Anomalous Observations
28%
Feature Dimension
28%
Outlier Ensembles
28%
Blind Watermarking
28%
Human Visual System Properties
28%
Authentication Protection
28%
Robust Watermark
28%
Dual-color Image
28%
Color Image Watermarking
28%
Malicious Behavior Detection
28%
Network Anomaly Detection System
28%
YouTube Comments
28%
Topic Sentiment
28%
Latent Topics
28%
Anomaly Characterization
28%
Outlierness
28%
Fuzzy Lattice Reasoning
28%
Topic Detection
28%
NLP Model
28%
Human Visual System
28%
Detection Analysis
28%
Particle Swarm Optimization
28%
Machine Learning Approach
28%
YouTube
28%
Scale Factor
28%
Sentiment Analysis
28%
Real-world Problems
28%
Internet of Things
28%
Learning Trends
28%
Immersive Learning
28%
Learning Challenges
28%
6LoWPAN
28%
Sinkhole Attack
28%
High Robustness
27%
Discrete Wavelet Transform
21%
Geometric Distortion
20%
Digital Signature
20%
Intellectual Property Protection
20%
Malicious Behavior
19%
Cover Image
14%
Computer Science
Watermarking Scheme
100%
Imperceptibility
64%
Local Outlier Factor
57%
Anomaly Detection
57%
Singular Value
50%
Human Visual System
42%
Copyright Protection
42%
Particle Swarm Optimization
42%
Outlier Detection
40%
Watermarking
35%
Feature Dimension
28%
Fragile Watermark
28%
Malicious Behavior
28%
Machine Learning Approach
28%
YouTube
28%
Authentication
28%
Emerging Technology
28%
Sentiment Analysis
28%
Real-World Problem
28%
Learning Technology
28%
Internet-Of-Things
28%
Scaling Factor
28%
Sinkhole Attack
28%
Wavelet Transforms
21%
Geometric Distortion
21%
Digital Signature
21%
Malicious Activity
19%
Image Authentication
14%
fragile watermarking
14%
Watermarking System
14%
Clear Understanding
14%
And-States
14%
Content Creation
14%
Digital Watermarking
14%
Multimedia
14%
Digital Image Watermarking
14%
Network Defense
9%
Network Based Intrusion Detection System
9%
Future Direction
9%
Ensemble Learning
9%
Machine Learning Technique
9%
Learning Technique
9%
Intrusion Detection System
9%
Preprocessing
9%
Feature Extraction
9%
Learning System
9%
Machine Learning
9%
Deep Learning Method
9%
Phase Detection
9%
Fuzzification
9%