Recognition-based visual authentication schemes use a variety of different kinds of images. These mechanisms have now matured sufficiently that we should start considering tailoring and fine-tuning them—looking at ways to make them more efficient. Since these mechanisms use images, the obvious starting point in this tailoring process is to consider the image type or genre being used by the mechanism. Images have a number of properties which are bound to influence the efficacy of the visual authentication mechanism. In this paper the notion of essential and tuning image properties is proposed. The former are those that an image must exhibit or possess in order to be used in visual authentication at all—failure to meet these metrics sh...
Visual Cryptography (VC) is perceived and studied as a perfect combination of secret sharing and dig...
The proliferation of digital data, and their distribution over different kinds of communication chan...
Abstract- With the advent of internet, various online attacks have been increased and among them the...
Recognition-based graphical authentication systems rely on the recognition of authenticator images...
* E-mail of the corresponding author As digital media has made our life more colourful because of it...
Recognition-based graphical authentication systems rely on the recognition of authenticator images b...
A thesis submitted to the University of Bedfordshire, in partial fulfilment of the requirements for ...
Information security in the present era is becoming very important in communication and data storag...
This paper presents a user study with 70 participants using four different image types: Mikon; doodl...
There has been tremendous advancement in multimedia in recent time. There are cameras everywhere aro...
The wide use of digital media during the past few years, has led to an increase of digital piracy an...
Abstract — A user authentication system using "unclear images " as pass-images has been pr...
Part 9: Usable SecurityInternational audienceWe present the design and user study of an adaptive aut...
Graphical authentication holds some potential as an alternative to the ubiquitous password. Graphica...
The combination of watermarking schemes with visual cryptography has been recently used for the copy...
Visual Cryptography (VC) is perceived and studied as a perfect combination of secret sharing and dig...
The proliferation of digital data, and their distribution over different kinds of communication chan...
Abstract- With the advent of internet, various online attacks have been increased and among them the...
Recognition-based graphical authentication systems rely on the recognition of authenticator images...
* E-mail of the corresponding author As digital media has made our life more colourful because of it...
Recognition-based graphical authentication systems rely on the recognition of authenticator images b...
A thesis submitted to the University of Bedfordshire, in partial fulfilment of the requirements for ...
Information security in the present era is becoming very important in communication and data storag...
This paper presents a user study with 70 participants using four different image types: Mikon; doodl...
There has been tremendous advancement in multimedia in recent time. There are cameras everywhere aro...
The wide use of digital media during the past few years, has led to an increase of digital piracy an...
Abstract — A user authentication system using "unclear images " as pass-images has been pr...
Part 9: Usable SecurityInternational audienceWe present the design and user study of an adaptive aut...
Graphical authentication holds some potential as an alternative to the ubiquitous password. Graphica...
The combination of watermarking schemes with visual cryptography has been recently used for the copy...
Visual Cryptography (VC) is perceived and studied as a perfect combination of secret sharing and dig...
The proliferation of digital data, and their distribution over different kinds of communication chan...
Abstract- With the advent of internet, various online attacks have been increased and among them the...