A secure cryptosystem based on affine transformation.
Mohsen TooraniAbolfazl FalahatiPublished in: Secur. Commun. Networks (2011)
Keyphrases
- affine transformation
- affine invariant
- private key
- key distribution
- public key cryptosystem
- feature points
- elliptic curve
- image registration
- public key
- image matching
- moment invariants
- similarity transformations
- diffie hellman
- b spline
- digital signature
- transformation model
- affine transform
- geometric transformations
- key management
- control points
- transformation parameters
- transformed images
- affine structure
- authentication scheme
- security requirements
- fourier descriptors
- curvature scale space
- authentication protocol
- image processing
- security mechanisms
- affine invariance