Graphical Authentication: Justifications and Objectives.
Justin D. PierceMatthew J. WarrenDavid R. MackayJason G. WellsPublished in: AISM (2004)
Keyphrases
- biometric authentication
- identity authentication
- security mechanisms
- security analysis
- image authentication
- semi fragile watermarking
- fragile watermarking
- authentication mechanism
- multiple objectives
- authentication scheme
- authentication protocol
- data encryption
- direct manipulation
- real time
- smart card
- access control
- learning algorithm
- neural network
- data sets