A Proxy User Authentication Protocol Using Source-Based Image Morphing.
Qian MaoK. BharanitharanChin-Chen ChangPublished in: Comput. J. (2015)
Keyphrases
- user authentication
- image morphing
- authentication protocol
- security analysis
- authentication scheme
- smart card
- elastic registration
- lightweight
- keystroke dynamics
- public key
- biometric authentication
- remote user authentication scheme
- security protocols
- information security
- rfid tags
- image processing
- high resolution
- object recognition
- high quality