Keyphrases
- authentication scheme
- image encryption
- chaotic map
- information systems
- smart card
- user authentication
- secret key
- authentication protocol
- public key
- security flaws
- information security
- hash functions
- security analysis
- piecewise linear
- security requirements
- security mechanisms
- end to end
- digital images
- nearest neighbor