Cargando…
Mobile authentication of copy detection patterns
In the recent years, the copy detection patterns (CDP) attracted a lot of attention as a link between the physical and digital worlds, which is of great interest for the internet of things and brand protection applications. However, the security of CDP in terms of their reproducibility by unauthoriz...
Autores principales: | Taran, Olga, Tutt, Joakim, Holotyak, Taras, Chaban, Roman, Bonev, Slavi, Voloshynovskiy, Slava |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer International Publishing
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10244288/ https://www.ncbi.nlm.nih.gov/pubmed/37292064 http://dx.doi.org/10.1186/s13635-023-00140-5 |
Ejemplares similares
-
Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns
por: Nowak, Jakub, et al.
Publicado: (2020) -
Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation
por: Taran, Olga, et al.
Publicado: (2020) -
Variational Information Bottleneck for Semi-Supervised Classification
por: Voloshynovskiy, Slava, et al.
Publicado: (2020) -
Information Bottleneck Classification in Extremely Distributed Systems
por: Ullmann, Denis, et al.
Publicado: (2020) -
Multivariate Time Series Information Bottleneck
por: Ullmann, Denis, et al.
Publicado: (2023)