Text and Image: A new hybrid authentication Scheme
نویسندگان
چکیده
منابع مشابه
A Hybrid Password Authentication Scheme Based on Shape and Text
Textual-based password authentication scheme tends to be more vulnerable to attacks such as shouldersurfing and hidden camera. To overcome the vulnerabilities of traditional methods, visual or graphical password schemes have been developed as possible alternative solutions to text-based password schemes. Because simply adopting graphical password authentication also has some drawbacks, schemes ...
متن کاملA New Scheme for Image Authentication Framework
The paper proposes a digital signature-based approach for image authentication, pixel-wise tamper localization and iterative restoration. Usage cases for semi-fragile watermarking and proposed digital signature are analyzed, the advantages of the digital signature method are presented. Integration with Public Key Infrastructure (PKI) is outlined and discussed.
متن کاملRepairable Image Authentication Scheme
Nowadays, authentication mechanism is widely applied to digital images to verify whether the received image is not a fake. In this paper, we propose a selfauthentication mechanism without any extra data to authenticate whether the area is modified by comparing the generated authentication code and hidden authentication code together. Also, the recovery ability is employed to the proposed scheme...
متن کاملA new hybrid fuzzy biometric-based image authentication model
Watermarking is one of the most known techniques for authentication, tampering detection, privacy control, etc. Concerning privacy protection of patients’ medical records, efforts have been devoted to guarantee the confidentiality of data and medical images during storage and transmission via an untrustworthy channel. Our developed watermarking system, aims at fulfilling such demands through th...
متن کامل‘Hop Horse’ Image Authentication Scheme
This paper proposes a novel scheme for securing and authenticating digital data. Although, the experiments were applied to digital images, it is valid for sound, and video without any modifications of the core scheme. The developed scheme could be applied to the encoded data at the sender and the receiver sides, apart from the compression and decompression processes. The watermark information i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Physics: Conference Series
سال: 2021
ISSN: 1742-6588,1742-6596
DOI: 10.1088/1742-6596/1793/1/012047