Abstract: Nowadays, we generate millions of data in the form of text, images, etc. Among them, images and text messages are widely used in communication. Due to their vulnerabilities, they are ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results