International Computer Science and Engineering Society (ICSES)
Written by: Admin | Link ...
ICSES Transactions on Image Processing and Pattern Recognition
Vol. 1, No. 1, Aug. 2015
A Sophisticated Approach to Secret Sharing Using XOR with Authentication Using Iris Recognition | Original Paper
a Munnar College of Engineering, Munnar, India.
Highlights and Novelties
Biometrics refers to technologies that measure and analyzes human body characteristics for authentication purposes. Iris recognition is a type of biometrics which use the features found in the iris to identify an individual. Visual cryptography is a cryptographic technique which hides information in images (called shares) that can be decrypted by human vision. Advanced hierarchical visual cryptography is a visual cryptographic technique used to improve the security which produces shares at different levels. For the authentication purpose, here the iris recognition is incorporated within the advanced hierarchical visual cryptography.
© Copyright was transferred to International Computer Science and Engineering Society (ICSES) by all the Authors.
Cite this manuscript as
Smitha Joseph, "A Sophisticated Approach to Secret Sharing Using XOR with Authentication Using Iris Recognition," ICSES Transactions on Image Processing and Pattern Recognition (ITIPPR), vol. 1, no. 1, pp. 6-10, Aug. 2015.
For External Scientific Databeses