How to Speak an Authentication Secret Securely from an Eavesdropper.
Lawrence O'GormanPublished in: Security Protocols Workshop (2006)
Keyphrases
- secure manner
- trusted third party
- secret key
- biometric authentication
- authentication mechanism
- secret sharing scheme
- image authentication
- user authentication
- authentication scheme
- secret information
- secret image sharing
- secret sharing
- security analysis
- identity authentication
- security mechanisms
- authentication protocol
- secret message
- fragile watermarking
- identity management
- digital images
- secret image
- digital watermarking
- spatial domain