Keyphrases
- mobile devices
- mobile phone
- authentication protocol
- fragile watermarking
- rfid tags
- identity authentication
- biometric authentication
- image authentication
- data sets
- authentication mechanism
- social tagging
- user authentication
- collaborative tagging
- search engine
- identity management
- rfid systems
- tag recommendation
- security analysis
- digital watermarking
- security mechanisms
- tag information
- security requirements
- smart phones
- semi fragile watermarking