Keyphrases
- electronic devices
- biometric authentication
- authentication scheme
- user authentication
- image authentication
- security analysis
- authentication protocol
- biometric data
- integrity verification
- authentication mechanism
- factor authentication
- semi fragile watermarking
- real time
- encryption decryption
- data encryption
- decision trees
- real world