ICSES Transactions on Image Processing and Pattern Recognition
Vol. 1, No. 1, Aug. 2015
A Sophisticated Approach to Secret Sharing Using XOR with Authentication Using Iris Recognition | Original Paper
|
Editors' Choice |
Original Paper |
|
5.9k Visits |
2.5k Downloads |
a Munnar College of Engineering, Munnar, India
Mr. Smitha Joseph
Corresponding Author Affiliation: Munnar College of Engineering, Munnar, India Tel: +9446541826 E-mail: josephsmitha33@gmail.com Mr. Smitha Joseph's publications in ICSES
|
This article has been retracted by International Computer Science and Engineering Society (ICSES) because of ethical misconduct, scientific distortion, or administrative error, and cannot be downloaded and used for any purpose based on the violation in ICSES Ethics in Publicationcall_made |
Retraction Note by the Editor-in-Chief
Highlights and Novelties
No Highlights!
Manuscript Abstract
Biometrics refers to technologies that measure and analyzes human body characteristics for authentication purposes. Iris recognition is a type of biometrics which use the features found in the iris to identify an individual. Visual cryptography is a cryptographic technique which hides information in images (called shares) that can be decrypted by human vision. Advanced hierarchical visual cryptography is a visual cryptographic technique used to improve the security which produces shares at different levels. For the authentication purpose, here the iris recognition is incorporated within the advanced hierarchical visual cryptography.
Keywords
Biometrics Hamming distance Hierarchical Visual Cryptography Iris Recognition.
Copyright and Licence
Copyright © International Computer Science and Engineering Society (ICSES). This article is an open-access article distributed under the terms and conditions of the Creative Commons Attribution Non Commercial 4.0 International (CC BY-NC 4.0) license, supported by creativecommons.orgcall_made
Cite this manuscript as
Smitha Joseph, "A Sophisticated Approach to Secret Sharing Using XOR with Authentication Using Iris Recognition," ICSES Transactions on Image Processing and Pattern Recognition, vol. 1, no. 1, pp. 6-10, Aug. 2015.
For External Scientific Databeses
--BibTex--
@article{al._0 title="A Sophisticated Approach to Secret Sharing Using XOR with Authentication Using Iris Recognition", author="Smitha Joseph", journal="ICSES Transactions on Image Processing and Pattern Recognition (ITIPPR)", volume="1", number="1", pages="6-10", year="2015", month="08", day="01", publisher= "International Computer Science and Engineering Society (ICSES)", doi="", url="http://www.i-cses.com/files/download.php?pID=0"}
--EndNote--
%0 Journal Article %T A Sophisticated Approach to Secret Sharing Using XOR with Authentication Using Iris Recognition %A Smitha Joseph %J ICSES Transactions on Image Processing and Pattern Recognition (ITIPPR) %V 1 %N 1 %P 6-10 %D 2015 %I International Computer Science and Engineering Society (ICSES) %U http://www.i-cses.com/files/download.php?pID=0 %8 2015-08-01 %R %@ 2645-8071
--Dublin--
< name="citation_title" content="A Sophisticated Approach to Secret Sharing Using XOR with Authentication Using Iris Recognition">
< name="citation_author" content="Smitha Joseph">
< name="citation_publication_date" content="2015-08-01">
< name="citation_journal_title" content="ICSES Transactions on Image Processing and Pattern Recognition (ITIPPR)">
< name="citation_issn" content="2645-8071">
< name="citation_volume" content="1">
< name="citation_issue" content="1">
< name="citation_firstpage" content="6">
< name="citation_lastpage" content="10">
< name="citation_pdf_url" content="http://www.i-cses.com/files/download.php?pID=0">
|