Exploring Handwritten Signature Image Features for Hardware Security.
Mahendra RathorAnirban SenguptaRahul ChaurasiaAditya AnshulPublished in: IEEE Trans. Dependable Secur. Comput. (2023)
Keyphrases
- image features
- digital copyright protection
- protection scheme
- random number generator
- low cost
- trusted computing
- access control
- intrusion detection
- information security
- real time
- blind signature scheme
- private key
- statistical databases
- computing systems
- hardware and software
- security policies
- security requirements
- character recognition
- computer vision
- feature vectors
- embedded systems
- security mechanisms
- word recognition
- image classification
- network security
- image processing
- numeral strings
- hardware implementation
- security issues
- massively parallel
- security protocols
- keypoints
- computer systems
- blind signature
- ring signature scheme