Secure Iris Authentication Using Visual Cryptography
P. S. RevenkarAnisa AnjumW. Z. GandharePublished in: CoRR (2010)
Keyphrases
- visual cryptography
- factor authentication
- secret sharing scheme
- secret sharing
- secret image sharing
- authentication scheme
- user authentication
- visual cryptography scheme
- authentication protocol
- security mechanisms
- security analysis
- security requirements
- key management
- secret image
- encryption scheme
- multimodal biometrics
- smart card
- resource constrained
- iris recognition
- image authentication
- public key
- digital signature
- image acquisition
- human eyes
- secret information
- ad hoc networks
- image processing
- multi party
- information security
- high quality