Developing Visual Cryptography for Authentication on Smartphones
暂无分享,去创建一个
[1] Ja-Chen Lin,et al. Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion , 2010, J. Vis. Commun. Image Represent..
[2] Vaishali B. Bhagat,et al. AUTHENTICATION FRAMEWORK USING VISUAL CRYPTOGRAPHY , 2013 .
[3] Moni Naor,et al. Visual Authentication and Identification , 1997, CRYPTO.
[4] Michael K. Reiter,et al. Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[5] Ching-Nung Yang,et al. Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme , 2006, Integr. Comput. Aided Eng..
[6] P. Babu Anto,et al. Tamperproof transmission of fingerprints using visual cryptography schemes , 2010, Biometrics Technology.
[7] Ching-Nung Yang,et al. Security Analysis of Authentication of Images Using Recursive Visual Cryptography , 2008, Cryptologia.
[8] WeiQi Yan,et al. Authenticating Visual Cryptography Shares Using 2D Barcodes , 2011, IWDW.
[9] Yasushi Yamaguchi,et al. Enhancing registration tolerance of extended visual cryptography for natural images , 2004, J. Electronic Imaging.
[10] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[11] Abhinav Aggarwal,et al. Novel authentication system using visual cryptography , 2011, 2011 World Congress on Information and Communication Technologies.
[12] WeiQi Yan,et al. Resolution variant visual cryptography for street view of Google Maps , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.
[13] Ching-Nung Yang,et al. Design a new visual cryptography for human-verifiable authentication in accessing a database , 2015, Journal of Real-Time Image Processing.
[14] V R Ratheesh,et al. A VISUAL CRYPTOGRAPHIC SCHEME FOR OWNER AUTHENTICATION USING EMBEDDED SHARES , 2014 .