نتایج جستجو برای: image authentication

تعداد نتایج: 408635  

Journal: :Research Letters in Signal Processing 2007

Journal: :Intelligent Automation & Soft Computing 2021

Journal: :INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING & TECHNOLOGY 2019

Journal: :Indian Journal of Science and Technology 2016

Journal: :Journal of Systems and Software 2007
Ching-Nung Yang Tse-Shih Chen Kun-Hsuan Yu Chung-Chun Wang

Recently, Lin and Tsai proposed an image secret sharing scheme with steganography and authentication to prevent participants from the incidental or intentional provision of a false stego-image (an image containing the hidden secret image). However, dishonest participants can easily manipulate the stego-image for successful authentication but cannot recover the secret image, i.e., compromise the...

2009
Takumi Yamamoto Yuko Kojima Masakatsu Nishigaki

Although image-based user authentication systems have gotten a lot of attention recently to reduce the burden of memorizing passwords, they can be vulnerable to shouldersurfing attacks. To overcome this problem, shoulder-surfingresistant image-based authentications with indirect image selection (indirect image-based authentication, or I-IBA) have been proposed. However, because they spatially a...

Image hashing allows compression, enhancement or other signal processing operations on digital images which are usually acceptable manipulations. Whereas, cryptographic hash functions are very sensitive to even single bit changes in image. Image hashing is a sum of important quality features in quantized form. In this paper, we proposed a novel image hashing algorithm for authentication which i...

2012
L. Sumalatha

Digital images make up a large component in the multimedia information. Hence Image authentication has attained a great importance and lead to the development of several image authentication algorithms. This paper proposes a block based watermarking scheme for image authentication based on the edge information extracted from each block. A signature is calculated from each edge block of the imag...

2013
Ravi Singh Pippal Pradeep Gupta Rakesh Singh

From the user point of view, security and efficiency are the two main factors for any authentication scheme. However, most of the smart card authentication schemes are vulnerable to one or the other possible attack. In this paper, highly secured smart card authentication scheme is proposed using image encryption that resists all the possible attacks and satisfies the needs of a user. Its securi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید