Login / Signup
Mobile authentication of copy detection patterns.
Olga Taran
Joakim Tutt
Taras Holotyak
Roman Chaban
Slavi Bonev
Slava Voloshynovskiy
Published in:
EURASIP J. Inf. Secur. (2023)
Keyphrases
</>
copy detection
mobile phone
mobile learning
pattern mining
neural network
access control
frequent patterns
design patterns
similar patterns
web services
data management
mobile computing
mobile environments
mobile commerce
biometric authentication