ICSES Transactions on Image Processing and Pattern Recognition

Vol. 1, No. 1, Aug. 2015


A Sophisticated Approach to Secret Sharing Using XOR with Authentication Using Iris Recognition | Original Paper

1- Munnar College of Engineering, Munnar, India.

Highlights and Novelties


No Highlights!


Manuscript Abstract
Biometrics refers to technologies that measure and analyzes human body characteristics for authentication purposes. Iris recognition is a type of biometrics which use the features found in the iris to identify an individual. Visual cryptography is a cryptographic technique which hides information in images (called shares) that can be decrypted by human vision. Advanced hierarchical visual cryptography is a visual cryptographic technique used to improve the security which produces shares at different levels. For the authentication purpose, here the iris recognition is incorporated within the advanced hierarchical visual cryptography.

Keywords
 Biometrics   Hamming distance   Hierarchical Visual Cryptography   Iris Recognition. 

Copyright
© Copyright was transferred to International Computer Science and Engineering Society (ICSES) by all the Authors.

Cite this manuscript as
Smitha Joseph, "A Sophisticated Approach to Secret Sharing Using XOR with Authentication Using Iris Recognition," ICSES Transactions on Image Processing and Pattern Recognition (ITIPPR), vol. 1, no. 1, pp. 6-10, Aug. 2015.

For External Scientific Databeses
Written by: Admin | Link ... |