Login / Signup
Pass-Image Authentication Method Tolerant to Random and Video-Recording Attacks.
Yutaka Hirakawa
Motohiro Take
Kazuo Ohzeki
Published in:
Int. J. Comput. Sci. Appl. (2012)
Keyphrases
</>
computational complexity
image authentication
computer vision
multiscale
motion estimation
semi fragile watermarking