Resilient-to-Visual-Recording


Description

The authentication scheme is resistant to attacks that are based on image-based recording. The recording can be used both for a stored video, for a real-time transmission, and is possible with static recordings (e.g. pictures) that contain snapshot for a certain time.