Showing 1 - 10 of 51
This paper presents a robust and imperceptible methodology of watermark embedding. It uses two vital techniques, firstly the Multi-Resolution Singular Value Decomposition (MR-SVD) and an image adaptive algorithm on the lines of the human visual system (HVS), called Noise Visibility Function...
Persistent link: https://www.econbiz.de/10012042710
In this article, the authors have proposed a secure two-factor remote user authentication and session key agreement … scheme provides the amenity of mutual authentication and session key agreement safely. The informal security verification has …
Persistent link: https://www.econbiz.de/10012043263
through peer to peer connections (ad hoc mode). Authentication is one among the most primary research challenges for the … authentication process, which are of major concern for real-time applications and media streaming application. In the same way, it is … traditional authentication mechanisms frequently adopted the names and passwords of clients as login authentication. However …
Persistent link: https://www.econbiz.de/10012043265
In remote user authentication, a server confirms the authenticity of a user via unreliable channel. Several … authentication protocols are devised in the literature relied on the identity, password and biometric of a user. But, most of the … authentication protocols are either computationally expensive or not-secure from several kinds of malicious threats. In this document …
Persistent link: https://www.econbiz.de/10012043272
Recently, Om et al. proposed three-factor remote user authentication protocol using ElGamal cryptosystem and ensured … discover that it unable to resist three attacks (like password guessing; denial of service; and user impersonation). Moreover …, their protocol is not facilitating user anonymity. To solve these security vulnerabilities, the authors devise a secure and …
Persistent link: https://www.econbiz.de/10012043273
The session initiation protocol is one the most popular protocols that is used in Internet protocol multimedia subsystems and adopted by a wide range of networking vendors. This research suggests a secure distributed session initiation protocol-based architectural model that can be deployed in...
Persistent link: https://www.econbiz.de/10012043352
problems, we propose in this paper an authentication and confidentiality scheme based on homomorphic encryption, and also a …
Persistent link: https://www.econbiz.de/10012043376
authentication watermark for each group, embed the watermark using the improved reversible data hiding approach, and hide the mark of …
Persistent link: https://www.econbiz.de/10012043915
feature of Braille for the authentication of VC. In this paper, the authors will conduct an experiment embedding Braille into …
Persistent link: https://www.econbiz.de/10012043929
pattern that aims to determine the optimal cost to be apply into security mechanisms deciding on the measure components of … and down time by implementing semi-group structure CIA pattern, mean while improving the throughput of the Business … time. This proposed CIA Pattern is the part of protection, detection, benchmarking, fault analysis and risk assessment of …
Persistent link: https://www.econbiz.de/10012043937