Bio-Authentication based Secure Transmission System using Steganography
Najme ZehraMansi SharmaSomya AhujaShubha BansalPublished in: CoRR (2010)
Keyphrases
- integrity verification
- authentication mechanism
- user authentication
- information hiding
- password authentication
- authentication scheme
- data encryption
- authentication protocol
- factor authentication
- identity management
- security mechanisms
- security analysis
- security requirements
- key distribution
- secure manner
- information security
- high capacity
- reed solomon codes
- public key cryptography
- private key
- smart card
- security services
- security issues
- hidden information
- least significant bit
- rights management
- secure communication
- public key
- encryption decryption
- access control
- electronic payment
- secret key
- secret information
- key agreement protocol
- mutual authentication
- key agreement
- digital watermarking
- cloud computing
- data hiding
- security protocols
- public key infrastructure
- spread spectrum
- key exchange protocol
- encryption scheme
- security policies
- error correction
- copyright protection