Alternative of traditional password systems using enhanced visual cryptography
Text-based passwords remain the most prevalent authentication mechanism despite their well-known security limitations. Studies consistently reveal weak password selection, reuse across platforms, and insufficient enforcement of robust security policies ...
Hasnae Chihi +2 more
doaj +1 more source
An enhanced visual cryptography framework for smart lock authentication
This paper introduces an access control system for shared spaces that combines enhanced visual cryptography with smart lock technology. The system shows clear visual indicators of occupancy while maintaining strong security through decentralized ...
Chihi Hasnae +2 more
doaj +1 more source
A copyright protection scheme for digital images based on shuffled singular value decomposition and visual cryptography. [PDF]
Devi BP, Singh KhM, Roy S.
europepmc +1 more source
VISUAL SYMMETRIC SPEECH CRYPTOGRAPHY
Today Communication is mainly depends upon digital data communication. Data is sent across internet using sequence of bits. Data integrity is major issue in such a communication. To preserve data integrity of the message sent over the internet various method of cryptography is used.
openaire +2 more sources
Sanket Sugaonkar +3 more
openaire +1 more source
A Secure Mutual Authentication Protocol Based on Visual Cryptography Technique for IoT-Cloud
Brou Bernard Ehuil +5 more
semanticscholar +1 more source
Ghost imaging-based optical multilevel authentication scheme using visual cryptography
Yi Kang +4 more
semanticscholar +1 more source
Enhanced Visual Cryptography Based on Arnold's Cat Map
The field of color visual cryptography has experienced significant growth, enabling the secure transmission of color images over the Internet. This innovative methodology partition images into shares, mirroring the principles of Naor and Shamir's ...
Hajir Alauldeen Al-Bayati +2 more
doaj
Lightweight semantic compression visual cryptography for secure medical image transmission in IoT systems. [PDF]
Blesswin AJ +5 more
europepmc +1 more source
Correction: Cellular automata based key distribution for lightweight hybrid image encryption with elliptic curve cryptography. [PDF]
Yogi B, Khan AK, Roy S.
europepmc +1 more source

