Login / Signup
Authentication from Weak PRFs with Hidden Auxiliary Input.
Daniel Masny
Published in:
IACR Cryptol. ePrint Arch. (2017)
Keyphrases
</>
user input
information retrieval
image authentication
real time
machine learning
similarity measure
multiscale
security mechanisms
user authentication
authentication mechanism
fragile watermarking