Chang et al., 2013 - Google Patents
A novel authentication scheme based on torus automorphism for smart cardChang et al., 2013
- Document ID
- 7218100698250400631
- Author
- Chang C
- Mao Q
- Wu H
- Publication year
- Publication venue
- Advances in Intelligent Systems and Applications-Volume 2: Proceedings of the International Computer Symposium ICS 2012 Held at Hualien, Taiwan, December 12–14, 2012
External Links
Snippet
A novel authentication scheme for smart card is proposed in this paper. In this scheme, the cardholder's photograph is printed on the card. Meanwhile, the compressed image of the same photograph is encrypted by the torus automorphism. The encrypted image is stored in …
- 239000011159 matrix material 0 description 8
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bloisi et al. | Image based steganography and cryptography. | |
Abundiz-Pérez et al. | A fingerprint image encryption scheme based on hyperchaotic Rössler map | |
Rahmani et al. | A crypto-steganography: A survey | |
Gafsi et al. | Efficient encryption system for numerical image safe transmission | |
Kavitha et al. | A survey on medical image encryption | |
Mehndiratta | Data hiding system using cryptography & steganography: a comprehensive modern investigation | |
Mohamed et al. | A new image encryption scheme based on the hybridization of lorenz chaotic map and fibonacci q-matrix | |
Chang et al. | A novel authentication scheme based on torus automorphism for smart card | |
Zeng et al. | Image encryption algorithm based on logistic-sine compound chaos | |
Dixit et al. | Multilevel network security combining cryptography and steganography on ARM platform | |
Lotlikar et al. | Image steganography and cryptography using three level password security | |
Stalin et al. | Payback of image encryption techniques: a quantitative investigation | |
Barakat et al. | Securing Digital Image using Modified Chaotic Logistic Key | |
Babatunde et al. | Performance analysis of gray code number system in image security | |
Abduljabbar et al. | Robust scheme to protect authentication code of message/image documents in cloud computing | |
Jayanthi et al. | A public key-based encryption and signature verification model for secured image transmission in network | |
Patil et al. | Significant study of data encryption and steganography | |
Ginesu et al. | Mutual image-based authentication framework with JPEG2000 in wireless environment | |
Abed et al. | Hiding algorithm based fused images and Caesar cipher with intelligent security enhancement. | |
Pawar et al. | Survey of cryptography techniques for data security | |
Kevadia et al. | A literature survey on image encryption | |
Francis | Information security using cryptography and steganography | |
Shetye et al. | Lossless and Reversible Data Hiding using Public Key Cryptography | |
Francis et al. | Secure Image Communication: Integrating Diffie-Hellman Key Exchange for Enhanced Confidentiality | |
Usman et al. | Securing Data on Transmission From Man-In-The-Middle Attacks using Diffie Hell-man Key Exchange Encryption Mechanism |