Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation.
Ziming ZhaoGail-Joon AhnHongxin HuPublished in: ACM Trans. Inf. Syst. Secur. (2015)
Keyphrases
- empirical analysis
- empirical studies
- theoretical analysis
- listed companies
- authentication scheme
- image authentication
- security mechanisms
- security analysis
- key distribution
- countermeasures
- watermarking scheme
- secret image sharing
- gesture recognition
- secure communication
- detect malicious
- watermarking algorithm
- hidden markov models
- authentication mechanism