Keyphrases
- mobile devices
- fragile watermarking
- authentication scheme
- third party
- identity authentication
- mobile applications
- security analysis
- security mechanisms
- biometric authentication
- augmented reality
- security requirements
- integrity verification
- desktop computers
- image authentication
- smart devices
- semi fragile watermarking
- encryption decryption
- keystroke dynamics
- factor authentication
- data sets
- user authentication
- authentication protocol
- sensitive information
- smart phones
- daily life
- wireless networks