当前位置: X-MOL 学术EURASIP J. Info. Secur. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Correction: Mobile authentication of copy detection patterns
EURASIP Journal on Information Security Pub Date : 2023-10-03 , DOI: 10.1186/s13635-023-00143-2
Olga Taran , Joakim Tutt , Taras Holotyak , Roman Chaban , Slavi Bonev , Slava Voloshynovskiy

Correction: EURASIP J Inf Secur 2023, 4 (2023)

https://doi.org/10.1186/s13635-023-00140-5

The original publication of this articled [1] contained 2 issues:

  1. 1.

    The "hat" indicates were incorrectly shown in the equations

  2. 2.

    There were problems with the readability of the figures & tables

The original publication has been updated to amend these errors. The publisher apologizes for the inconvenience caused to the authors & readers.

  1. O. Taran et al., Mobile authentication of copy detection patterns. EURASIP J. Inf. Secur. 2023, 4 (2023). https://doi.org/10.1186/s13635-023-00140-5

    Article Google Scholar

Download references

Authors and Affiliations

  1. Stochastic Information Processing Group, Department of Computer Science, University of Geneva, 7 Route de Drize, 1227, Carouge, Switzerland

    Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev & Slava Voloshynovskiy

Authors
  1. Olga TaranView author publications

    You can also search for this author in PubMed Google Scholar

  2. Joakim TuttView author publications

    You can also search for this author in PubMed Google Scholar

  3. Taras HolotyakView author publications

    You can also search for this author in PubMed Google Scholar

  4. Roman ChabanView author publications

    You can also search for this author in PubMed Google Scholar

  5. Slavi BonevView author publications

    You can also search for this author in PubMed Google Scholar

  6. Slava VoloshynovskiyView author publications

    You can also search for this author in PubMed Google Scholar

Corresponding authors

Correspondence to Olga Taran or Slava Voloshynovskiy.

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and Permissions

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Taran, O., Tutt, J., Holotyak, T. et al. Correction: Mobile authentication of copy detection patterns. EURASIP J. on Info. Security 2023, 8 (2023). https://doi.org/10.1186/s13635-023-00143-2

Download citation

  • Published:

  • DOI: https://doi.org/10.1186/s13635-023-00143-2

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative



中文翻译:

更正:复制检测模式的移动认证

更正:EURASIP J Inf Secur 2023, 4 (2023)

https://doi.org/10.1186/s13635-023-00140-5

本文[1]的原始出版物包含 2 期:

  1. 1.

    “帽子”表示方程中的显示不正确

  2. 2.

    图表的可读性存在问题

原始出版物已更新以修正这些错误。出版商对给作者和读者造成的不便表示歉意。

  1. O. Taran 等人,复制检测模式的移动认证。EURASIP J. Inf。安全。2023 , 4 (2023)。https://doi.org/10.1186/s13635-023-00140-5

    文章谷歌学术

下载参考资料

作者和单位

  1. 随机信息处理小组,计算机科学系,日内瓦大学,7 Route de Drize, 1227, Carouge, Switzerland

    奥尔加·塔兰、乔金·塔特、塔拉斯·霍洛蒂亚克、罗曼·查班、斯拉维·博内夫和斯拉瓦·沃洛什诺夫斯基

作者
  1. 奥尔加·塔兰查看作者出版物

    您也可以在PubMed Google Scholar中搜索该作者 

  2. Joakim Tutt查看作者出版物

    您也可以在PubMed Google Scholar中搜索该作者 

  3. Taras Holotyak查看作者出版物

    您也可以在PubMed Google Scholar中搜索该作者 

  4. Roman Chaban查看作者出版物

    您也可以在PubMed Google Scholar中搜索该作者 

  5. Slavi Bonev查看作者出版物

    您也可以在PubMed Google Scholar中搜索该作者 

  6. Slava Voloshynovskiy查看作者出版物

    您也可以在PubMed Google Scholar中搜索该作者 

通讯作者

通讯作者:Olga Taran 或 Slava Voloshynovskiy。

开放获取本文根据知识共享署名 4.0 国际许可证获得许可,该许可证允许以任何媒介或格式使用、共享、改编、分发和复制,只要您对原作者和来源给予适当的认可,并提供链接到知识共享许可证,并指出是否进行了更改。本文中的图像或其他第三方材料包含在文章的知识共享许可中,除非材料的出处中另有说明。如果文章的知识共享许可中未包含材料,并且您的预期用途不受法律法规允许或超出了允许的用途,则您需要直接获得版权所有者的许可。要查看此许可证的副本,请访问 http://creativecommons.org/licenses/by/4.0/。

转载和许可

检查更新。 通过 CrossMark 验证货币和真实性

引用这篇文章

Taran, O.、Tutt, J.、Holotyak, T.等人。更正:复制检测模式的移动认证。EURASIP J. 关于信息。安全 2023,8 (2023)。https://doi.org/10.1186/s13635-023-00143-2

下载引文

  • 发表

  • DOI https://doi.org/10.1186/s13635-023-00143-2

分享此文章

您与之分享以下链接的任何人都可以阅读此内容:

抱歉,本文目前没有可共享的链接。

由 Springer Nature SharedIt 内容共享计划提供

更新日期:2023-10-03
down
wechat
bug