2014 IEEE Students' Conference on Electrical, Electronics and Computer Science 2014
DOI: 10.1109/sceecs.2014.6804453
|View full text |Cite
|
Sign up to set email alerts
|

Signature based authentication using contrast enhanced hierarchical visual cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
9
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 28 publications
(9 citation statements)
references
References 3 publications
0
9
0
Order By: Relevance
“…(k, n)-threshold ISS has a loss-tolerant property, i.e., the dealer can reconstruct the secret with at most n − k shares lost. Hence, ISS is applied to several applications, such as key management [1], digital watermarking [2], [3], identity authentication [4], [5], blockchain [6], access control [7], password transmission [8] and distributive storage for the cloud [9]- [11]. A digital image is a specific form of data, where each grayscale (binary) pixel is represented by 8 bits (1 bit); hence, ISS easily generates shares for secret sharing.…”
Section: Introductionmentioning
confidence: 99%
“…(k, n)-threshold ISS has a loss-tolerant property, i.e., the dealer can reconstruct the secret with at most n − k shares lost. Hence, ISS is applied to several applications, such as key management [1], digital watermarking [2], [3], identity authentication [4], [5], blockchain [6], access control [7], password transmission [8] and distributive storage for the cloud [9]- [11]. A digital image is a specific form of data, where each grayscale (binary) pixel is represented by 8 bits (1 bit); hence, ISS easily generates shares for secret sharing.…”
Section: Introductionmentioning
confidence: 99%
“…The applicability of the system is in accessing the secure resources by only authenticated users. The system implemented in [3] has two modules.…”
Section: Secure Iris Authentication Using Visual Cryptography [3]mentioning
confidence: 99%
“…Furthermore, regardless of how computationally powerful the device an attacker has, he cannot obtain any information about the multimedia data. As a result, secret sharing can potentially be applied to some scenarios [4], such as block chain [5], key management [6], digital watermarking [7], [8], identity authentication [9], [10], and distributive storage [11], [12].…”
Section: Introductionmentioning
confidence: 99%