Login / Signup
Security-oriented picture-in-picture visual modifications.
Thanh-Toan Do
Ewa Kijak
Laurent Amsaleg
Teddy Furon
Published in:
ICMR (2012)
Keyphrases
</>
access control
visual cues
security requirements
genetic algorithm
computer vision
visual information
information security
security issues
visual perception
computer security
security protocols
security level