Skip to main content
Fig. 12 | EURASIP Journal on Information Security

Fig. 12

From: Mobile authentication of copy detection patterns

Fig. 12

General scheme of a deep model that aims at estimating the digital templates \(\hat{{\textbf {t}}}\) from the original printed codes \({\textbf {x}}\) with the following mapping of the estimated digital templates \(\hat{{\textbf {t}}}\) back to the printed codes \(\hat{{\textbf {x}}}\)

Back to article page