Login / Signup
Pass-Image Authentication Method Tolerant to Video-Recording Attacks.
Yutaka Hirakawa
Hiroyuki Take
Kazuo Ohzeki
Published in:
FedCSIS (2011)
Keyphrases
</>
metadata
image processing
computational complexity
edge detection