Keyphrases
- security analysis
- public key
- authentication protocol
- user authentication
- hardware and software
- low cost
- management system
- computer systems
- real time
- hardware implementation
- embedded systems
- image processing
- big data
- vlsi implementation
- image authentication
- image encryption algorithm
- biometric authentication
- hardware design
- computing systems
- location information
- cloud computing