Login / Signup

Multi-image steganography and authentication using crypto-stego techniques.

Himani SharmaDeep Chandra MishraR. K. SharmaNaveen Kumar
Published in: Multim. Tools Appl. (2021)
Keyphrases
  • factor authentication
  • security mechanisms
  • hidden information
  • private key
  • low cost
  • image reconstruction
  • public key
  • security protocols
  • digital signature
  • biometric authentication
  • authentication mechanism