Chavan et al., 2014 - Google Patents
Signature based authentication using contrast enhanced hierarchical visual cryptographyChavan et al., 2014
- Document ID
- 4607132027772529418
- Author
- Chavan P
- Atique M
- Malik L
- Publication year
- Publication venue
- 2014 IEEE Students' Conference on Electrical, Electronics and Computer Science
External Links
Snippet
Idea stated in this paper describes the application of hierarchical visual cryptography to the authentication system. This is an alternative approach for fingerprint based authentication mechanism. Fingerprint based authentication mechanism have two major problems …
- 230000000007 visual effect 0 title abstract description 59
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chavan et al. | Signature based authentication using contrast enhanced hierarchical visual cryptography | |
EP1484690A1 (en) | Authenticating method | |
WO2008010773A1 (en) | Method for generating cryptographic key from biometric data | |
AU2008261152A1 (en) | Privacy-Protected Biometric Tokens | |
WO2012097362A2 (en) | Protecting codes, keys and user credentials with identity and patterns | |
CN106030668A (en) | Methods and systems for multi-key veritable biometric identity authentication | |
Go et al. | Construction of a secure two-factor user authentication system using fingerprint information and password | |
Bathen et al. | Selfis: Self-sovereign biometric ids | |
Han et al. | A novel hybrid crypto-biometric authentication scheme for ATM based banking applications | |
Loukhaoukha et al. | An efficient image encryption algorithm based on blocks permutation and Rubik's cube principle for iris images | |
Thawre et al. | Survey on security of biometric data using cryptography | |
Gupta et al. | A model for biometric security using visual cryptography | |
Simkin et al. | Ubic: Bridging the gap between digital cryptography and the physical world | |
Habibu et al. | Developing an algorithm for securing the biometric data template in the database | |
Pathak et al. | Visual cryptography and image processing based approach for bank security applications | |
Srinivas et al. | A Novel Approach For Generation of OTP'S Using Image's | |
Joshi | Session passwords using grids and colors for web applications and PDA | |
Boddeti et al. | A biometric key-binding and template protection framework using correlation filters | |
Alaa et al. | A Survey of Parallel Message Authentication and Hashing Methods | |
Kumar et al. | Design and development of e-passports using biometric access control system | |
Panigrahy et al. | On the privacy protection of biometric traits: palmprint, face, and signature | |
Waghmare et al. | A review on shoulder surfing attack in authentication technique | |
Surve | Visual cryptography and image processing based approach for bank security applications | |
Madankar et al. | Biometric Privacy Using Various Cryptographic Scheme | |
Lin et al. | A tabular steganography scheme for graphical password authentication |