Login / Signup

Secured approach for authentication using threshold-based hierarchical visual cryptography.

Pallavi Vijay ChavanMohammad Atique
Published in: Int. J. Inf. Priv. Secur. Integr. (2015)
Keyphrases
  • visual cryptography
  • secret image sharing
  • visual cryptography scheme
  • secret sharing scheme
  • secret sharing
  • multiscale
  • image authentication
  • human eyes