[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Chavan et al., 2014 - Google Patents

Signature based authentication using contrast enhanced hierarchical visual cryptography

Chavan et al., 2014

Document ID
4607132027772529418
Author
Chavan P
Atique M
Malik L
Publication year
Publication venue
2014 IEEE Students' Conference on Electrical, Electronics and Computer Science

External Links

Snippet

Idea stated in this paper describes the application of hierarchical visual cryptography to the authentication system. This is an alternative approach for fingerprint based authentication mechanism. Fingerprint based authentication mechanism have two major problems …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Similar Documents

Publication Publication Date Title
Chavan et al. Signature based authentication using contrast enhanced hierarchical visual cryptography
EP1484690A1 (en) Authenticating method
WO2008010773A1 (en) Method for generating cryptographic key from biometric data
AU2008261152A1 (en) Privacy-Protected Biometric Tokens
WO2012097362A2 (en) Protecting codes, keys and user credentials with identity and patterns
CN106030668A (en) Methods and systems for multi-key veritable biometric identity authentication
Go et al. Construction of a secure two-factor user authentication system using fingerprint information and password
Bathen et al. Selfis: Self-sovereign biometric ids
Han et al. A novel hybrid crypto-biometric authentication scheme for ATM based banking applications
Loukhaoukha et al. An efficient image encryption algorithm based on blocks permutation and Rubik's cube principle for iris images
Thawre et al. Survey on security of biometric data using cryptography
Gupta et al. A model for biometric security using visual cryptography
Simkin et al. Ubic: Bridging the gap between digital cryptography and the physical world
Habibu et al. Developing an algorithm for securing the biometric data template in the database
Pathak et al. Visual cryptography and image processing based approach for bank security applications
Srinivas et al. A Novel Approach For Generation of OTP'S Using Image's
Joshi Session passwords using grids and colors for web applications and PDA
Boddeti et al. A biometric key-binding and template protection framework using correlation filters
Alaa et al. A Survey of Parallel Message Authentication and Hashing Methods
Kumar et al. Design and development of e-passports using biometric access control system
Panigrahy et al. On the privacy protection of biometric traits: palmprint, face, and signature
Waghmare et al. A review on shoulder surfing attack in authentication technique
Surve Visual cryptography and image processing based approach for bank security applications
Madankar et al. Biometric Privacy Using Various Cryptographic Scheme
Lin et al. A tabular steganography scheme for graphical password authentication