Authentication with What You See and Remember in the Internet of Things.
Wayne ChiuChunhua SuChuan-Yen FanChien-Ming ChenKuo-Hui YehPublished in: Symmetry (2018)
Keyphrases
- mobile devices
- biometric authentication
- identity authentication
- ubiquitous computing
- physical world
- key technologies
- identity management
- authentication protocol
- semi fragile watermarking
- fragile watermarking
- authentication mechanism
- user authentication
- authentication scheme
- digital images
- artificial intelligence
- data sets
- database
- security analysis
- everyday life
- big data
- data encryption
- integrity verification
- factor authentication