2020
DOI: 10.1080/19393555.2020.1817633
|View full text |Cite
|
Sign up to set email alerts
|

Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 28 publications
0
6
0
Order By: Relevance
“…Protecting voter privacy, ensuring secrecy, anonymity, integrity, uniqueness, and legitimacy of votes, while making e-Voting as trustworthy as voting, remains the key challenges of e-Voting. a secure open-source e-voting system is introduced that uses cryptographic techniques to separate the both voter identification and voting phases [17]. The Election system is one of essential parts of democratic country that in-volves the several procedures.…”
Section: Iot and Cloud Computing In Electronic Election Voting Systemmentioning
confidence: 99%
“…Protecting voter privacy, ensuring secrecy, anonymity, integrity, uniqueness, and legitimacy of votes, while making e-Voting as trustworthy as voting, remains the key challenges of e-Voting. a secure open-source e-voting system is introduced that uses cryptographic techniques to separate the both voter identification and voting phases [17]. The Election system is one of essential parts of democratic country that in-volves the several procedures.…”
Section: Iot and Cloud Computing In Electronic Election Voting Systemmentioning
confidence: 99%
“…Visual cryptography is used for face identification. According to the research carried out by Ibrahim et al, it was revealed that a multifactor authentication system to be preferred instead of visual cryptography provides a faster verification opportunity and increases security with multiple verifications [3]. Using multiple authentication methods, especially using biometric data, is a good measure to deter attackers.…”
Section: Related Workmentioning
confidence: 99%
“…Other interesting approaches for authentication are presented in [21], in which the authentication is based on information about body composition analysis; ref. [22] presents a method of authentication based on eye color and facial recognition; ref. [23] presents an authentication method based on hand gestures captured by surface electromyography.…”
Section: State-of-the-art Approachmentioning
confidence: 99%