Sign in

Security-oriented picture-in-picture visual modifications.

Thanh-Toan DoEwa KijakLaurent AmsalegTeddy Furon
Published in: ICMR (2012)
Keyphrases
  • access control
  • visual cues
  • security requirements
  • genetic algorithm
  • computer vision
  • visual information
  • information security
  • security issues
  • visual perception
  • computer security
  • security protocols
  • security level