Resistance to Pirates 2.0: A Method from Leakage Resilient Cryptography.
Duong Hieu PhanViet Cuong TrinhPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- high precision
- clustering method
- computational cost
- cost function
- significant improvement
- similarity measure
- evaluation method
- detection method
- main contribution
- computationally efficient
- prior knowledge
- computational complexity
- experimental evaluation
- optimization method
- fully automatic
- high dimensional
- objective function
- synthetic data
- video sequences
- genetic algorithm
- optical flow
- detection algorithm
- preprocessing
- theoretical analysis
- denoising
- artificial neural networks
- multiresolution