Photographic Authentication through Untrusted Terminals.
Trevor PeringMurali SundarJohn LightRoy WantPublished in: IEEE Pervasive Comput. (2003)
Keyphrases
- third party
- authentication protocol
- fragile watermarking
- authentication scheme
- identity authentication
- data encryption
- security mechanisms
- privacy preserving
- mobile terminals
- relational databases
- genetic algorithm
- security policies
- biometric authentication
- image authentication
- authentication mechanism
- user authentication
- security analysis
- signature verification
- digital watermarking
- database
- black and white
- communication systems
- gray level
- neural network
- data sets