Undercover: authentication usable in front of prying eyes.
Hirokazu SasamotoNicolas ChristinEiji HayashiPublished in: CHI (2008)
Keyphrases
- user authentication
- security requirements
- authentication mechanism
- biometric authentication
- encryption decryption
- identity authentication
- security mechanisms
- authentication scheme
- semi fragile watermarking
- neural network
- object detection
- face recognition
- security analysis
- identity management
- multimodal biometrics
- facial features
- integrity verification
- search engine