Signature based authentication using contrast enhanced hierarchical visual cryptography
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] K.R. Venugopal,et al. Secure Authentication using Image Processing and Visual Cryptography for Banking Applications , 2008, 2008 16th International Conference on Advanced Computing and Communications.
[3] W. Z. Gandhare,et al. Secure Iris Authentication Using Visual Cryptography , 2010, ArXiv.
[4] Shefali Sonavane,et al. Multi-Share Crypt-Stego Authentication System , 2013 .
[5] Li-Guo Fang,et al. Multi-secret Visual Cryptography Based on Reversed Images , 2010, 2010 Third International Conference on Information and Computing.
[6] Chao-Wen Chan,et al. A Visual Information Encryption Scheme Based on Visual Cryptography and D-H Key Agreement Scheme , 2008 .
[7] P. Babu Anto,et al. Contrast-Enhanced Visual Cryptography Schemes Based on Additional Pixel Patterns , 2010, 2010 International Conference on Cyberworlds.
[8] Anand Sharma,et al. Visual cryptography improvises the security of tongue as a biometric in banking system , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).
[9] Yi-Hui Chen,et al. Authentication Mechanism for Secret Sharing Using Boolean Operation , 2012 .
[10] Abhinav Aggarwal,et al. Novel authentication system using visual cryptography , 2011, 2011 World Congress on Information and Communication Technologies.
[11] Y.V.S. Rao,et al. Fingerprint based authentication application using visual cryptography methods (Improved ID card) , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.