Songs Authentication through Embedding a Self Generated Secure Hidden Signal (SAHS).
Uttam Kr. MondalJyotsna Kumar MandalPublished in: CISIM (2011)
Keyphrases
- user authentication
- authentication scheme
- authentication mechanism
- security mechanisms
- identity management
- integrity verification
- security analysis
- data encryption
- security requirements
- key distribution
- authentication protocol
- signal processing
- factor authentication
- frequency domain
- secure manner
- password authentication
- security services
- high frequency
- biometric authentication
- audio signal
- secure communication
- public key cryptography
- trusted third party
- information hiding
- secret key
- security issues
- smart card
- rights management