Keyphrases
- user authentication
- biometric authentication
- fragile watermarking
- authentication scheme
- semi fragile watermarking
- authentication mechanism
- identity management
- security mechanisms
- case study
- authentication protocol
- image authentication
- bibliographic databases
- scheduling problem
- identity authentication
- keystroke dynamics
- data encryption
- integrity verification
- neural network
- real time