Showing 1 - 8 results of 8 for search '"The Hidden Cameras"', query time: 1.53s Refine Results
  1. 1
    by Shih-Shiang Liao, 廖士翔
    Published 2013
    ... the hidden-cameras gathering. This article discussed about the phenomena of news-gathering through hidden...
    Get full text
    Others
  2. 2
    by Chun-Yu Yang, 楊竣宇
    Published 2013
    ... forth to prevent illicit videotaping using hidden cameras. One of the most effective ways to cease...
    Get full text
    Others
  3. 3
    by Chu,Yu-Wen, 朱玉汶
    Published 2013
    ... or developed hidden camera. The issue that government and people should concern is the personal privacy...
    Get full text
    Others
  4. 4
    by Pei-Jia QIU, 邱培嘉
    Published 2015
    ... information while users in the login process by using the shoulder-surfing attack and/or the hidden-camera...
    Get full text
    Others
  5. 5
    by Yu-Ting Hsieh, 謝語婷
    Published 2010
    ... in the detection of hidden camera operation. In general, the structure of a video sequence can be divided into four...
    Get full text
    Others
  6. 6
    by Yu-Chang Yeh, 葉育彰
    Published 2013
    ... schemes are vulnerable to login-recording attacks, including the shoulder-surfing attack, the hidden...
    Get full text
    Others
  7. 7
    by Chia-Ju Chang, 張家儒
    Published 2015
    ..., the hidden-camera attack, the spyware attack, and the wiretapping attack. Thus, many PIN-entry methods...
    Get full text
    Others
  8. 8
    by CHANG, WEI-LI, 張維里
    Published 2019
    ... authentication schemes are vulnerable to capture attacks, which may be the shoulder-surfing attack, the hidden...
    Get full text
    Others