Login / Signup
Security Analysis of Authentication of Images Using Recursive Visual Cryptography.
Ching-Nung Yang
Tse-Shih Chen
Published in:
Cryptologia (2008)
Keyphrases
</>
security analysis
image data
smart card
secret image
authentication protocol
test images
public key
visual cryptography
mutual authentication
user authentication
security requirements
authentication scheme
human eyes