International Computer Science and Engineering Society (ICSES) |
ICSES Transactions on Image Processing and Pattern Recognition
Vol. 1, No. 1, Aug. 2015 A Sophisticated Approach to Secret Sharing Using XOR with Authentication Using Iris Recognition | Original Paper
a Munnar College of Engineering, Munnar, India
Corresponding Author Affiliation: Munnar College of Engineering, Munnar, India Tel: +9446541826 E-mail: josephsmitha33@gmail.com
Highlights and Novelties
Manuscript Abstract
Biometrics refers to technologies that measure and analyzes human body characteristics for authentication purposes. Iris recognition is a type of biometrics which use the features found in the iris to identify an individual. Visual cryptography is a cryptographic technique which hides information in images (called shares) that can be decrypted by human vision. Advanced hierarchical visual cryptography is a visual cryptographic technique used to improve the security which produces shares at different levels. For the authentication purpose, here the iris recognition is incorporated within the advanced hierarchical visual cryptography. Keywords
Biometrics Hamming distance Hierarchical Visual Cryptography Iris Recognition. Copyright
© Copyright was transferred to International Computer Science and Engineering Society (ICSES) by all the Authors. Cite this manuscript as
Smitha Joseph, "A Sophisticated Approach to Secret Sharing Using XOR with Authentication Using Iris Recognition," ICSES Transactions on Image Processing and Pattern Recognition (ITIPPR), vol. 1, no. 1, pp. 6-10, Aug. 2015. For External Scientific Databeses
|
Written by: Admin | Link ... |