2023
DOI: 10.32604/csse.2023.028975
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced Graphical Authentication Scheme Using Multiple-Image Steganography

Abstract: Most remote systems require user authentication to access resources. Text-based passwords are still widely used as a standard method of user authentication. Although conventional text-based passwords are rather hard to remember, users often write their passwords down in order to compromise security. One of the most complex challenges users may face is posting sensitive data on external data centers that are accessible to others and do not be controlled directly by users. Graphical user authentication methods h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…This allows noninfected patients to poll the health authority frequently to check whether they have been in close contact with infected patients. Moreover, privacy in the healthcare domain can also be achieved using private messaging systems [145], private set intersection protocols [146], and memo verification methods using cryptography [147]. However, these protocols are computationally intensive, requiring a tradeoff between security and computational efficiency [148].…”
Section: Privacy and Securitymentioning
confidence: 99%
“…This allows noninfected patients to poll the health authority frequently to check whether they have been in close contact with infected patients. Moreover, privacy in the healthcare domain can also be achieved using private messaging systems [145], private set intersection protocols [146], and memo verification methods using cryptography [147]. However, these protocols are computationally intensive, requiring a tradeoff between security and computational efficiency [148].…”
Section: Privacy and Securitymentioning
confidence: 99%