Results 71 to 80 of about 2,287,880 (206)

Alternative of traditional password systems using enhanced visual cryptography

open access: yesDiscover Computing
Text-based passwords remain the most prevalent authentication mechanism despite their well-known security limitations. Studies consistently reveal weak password selection, reuse across platforms, and insufficient enforcement of robust security policies ...
Hasnae Chihi   +2 more
doaj   +1 more source

An enhanced visual cryptography framework for smart lock authentication

open access: yesDiscover Internet of Things
This paper introduces an access control system for shared spaces that combines enhanced visual cryptography with smart lock technology. The system shows clear visual indicators of occupancy while maintaining strong security through decentralized ...
Chihi Hasnae   +2 more
doaj   +1 more source

VISUAL SYMMETRIC SPEECH CRYPTOGRAPHY

open access: yesInternational Journal of Advanced Research in Computer Science, 2018
Today Communication is mainly depends upon digital data communication.  Data is sent across internet using sequence of bits. Data integrity is major issue in such a communication. To preserve data integrity of the message sent over the internet various method of cryptography is used.
openaire   +2 more sources

Visual Cryptography Survey

open access: yesInternational Journal of Computer Applications, 2016
Sanket Sugaonkar   +3 more
openaire   +1 more source

A Secure Mutual Authentication Protocol Based on Visual Cryptography Technique for IoT-Cloud

open access: yesChinese journal of electronics
Brou Bernard Ehuil   +5 more
semanticscholar   +1 more source

Ghost imaging-based optical multilevel authentication scheme using visual cryptography

open access: yesOptics Communications, 2022
Yi Kang   +4 more
semanticscholar   +1 more source

Enhanced Visual Cryptography Based on Arnold's Cat Map

open access: yesInternational Journal of Computing and Related Technologies
The field of color visual cryptography has experienced significant growth, enabling the secure transmission of color images over the Internet. This innovative methodology partition images into shares, mirroring the principles of Naor and Shamir's ...
Hajir Alauldeen Al-Bayati   +2 more
doaj  

Home - About - Disclaimer - Privacy