Detecting adversarial examples - A lesson from multimedia security