cyber security usability password user authentication information security human factors biometrics security research digital watermarking signal processing multimedia captcha phd attack collaboration government university policy user compression discrete optimization dct video coding transform coding encryption image coding algorithm cryptanalysis image processing linear programming image forensics video copyright identify authentication automation machine learning performance evaluation man-in-the-middle attacks card skimmers shoulder surfers observation attack keyloggers human behaviour hidden cameras malware
Ver más