Login / Signup
A Hybrid Cryptographic and Steganographic Security Approach for Identity Management and Security of Digital Images.
Quist-Aphetsi Kester
Laurent Nana
Anca Christine Pascu
Sophie Gire
Jojo Moses Eghan
Nii Narku Quaynor
Published in:
SSCC (2015)
Keyphrases
</>
digital images
identity management
access control
security requirements
information security
security properties
smart card
key management
security protocols
database
encryption scheme
fuzzy vault
security mechanisms
network security
cloud computing
databases
high level
least significant bit