No-leak authentication by the Sherlock Holmes method.
Dima GrigorievVladimir ShpilrainPublished in: Groups Complex. Cryptol. (2012)
Keyphrases
- preprocessing
- cost function
- high accuracy
- high precision
- synthetic data
- fully automatic
- multiscale
- support vector machine svm
- edge detection
- detection method
- clustering method
- optimization algorithm
- input data
- feature set
- neural network
- probabilistic model
- computational cost
- dynamic programming
- similarity measure
- image processing