[go: up one dir, main page]

Chang et al., 2013 - Google Patents

A novel authentication scheme based on torus automorphism for smart card

Chang et al., 2013

Document ID
7218100698250400631
Author
Chang C
Mao Q
Wu H
Publication year
Publication venue
Advances in Intelligent Systems and Applications-Volume 2: Proceedings of the International Computer Symposium ICS 2012 Held at Hualien, Taiwan, December 12–14, 2012

External Links

Snippet

A novel authentication scheme for smart card is proposed in this paper. In this scheme, the cardholder's photograph is printed on the card. Meanwhile, the compressed image of the same photograph is encrypted by the torus automorphism. The encrypted image is stored in …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Similar Documents

Publication Publication Date Title
Bloisi et al. Image based steganography and cryptography.
Abundiz-Pérez et al. A fingerprint image encryption scheme based on hyperchaotic Rössler map
Rahmani et al. A crypto-steganography: A survey
Gafsi et al. Efficient encryption system for numerical image safe transmission
Kavitha et al. A survey on medical image encryption
Mehndiratta Data hiding system using cryptography & steganography: a comprehensive modern investigation
Mohamed et al. A new image encryption scheme based on the hybridization of lorenz chaotic map and fibonacci q-matrix
Chang et al. A novel authentication scheme based on torus automorphism for smart card
Zeng et al. Image encryption algorithm based on logistic-sine compound chaos
Dixit et al. Multilevel network security combining cryptography and steganography on ARM platform
Lotlikar et al. Image steganography and cryptography using three level password security
Stalin et al. Payback of image encryption techniques: a quantitative investigation
Barakat et al. Securing Digital Image using Modified Chaotic Logistic Key
Babatunde et al. Performance analysis of gray code number system in image security
Abduljabbar et al. Robust scheme to protect authentication code of message/image documents in cloud computing
Jayanthi et al. A public key-based encryption and signature verification model for secured image transmission in network
Patil et al. Significant study of data encryption and steganography
Ginesu et al. Mutual image-based authentication framework with JPEG2000 in wireless environment
Abed et al. Hiding algorithm based fused images and Caesar cipher with intelligent security enhancement.
Pawar et al. Survey of cryptography techniques for data security
Kevadia et al. A literature survey on image encryption
Francis Information security using cryptography and steganography
Shetye et al. Lossless and Reversible Data Hiding using Public Key Cryptography
Francis et al. Secure Image Communication: Integrating Diffie-Hellman Key Exchange for Enhanced Confidentiality
Usman et al. Securing Data on Transmission From Man-In-The-Middle Attacks using Diffie Hell-man Key Exchange Encryption Mechanism