TM Dang, L Tran, TD Nguyen… - Proceedings of the IEEE …, 2020 - openaccess.thecvf.com
… Nowadays, the robustness of most security systems rely on the strength of cryptographickey (… Authentication based on a concept of ”who we are” is much more convenient than ”what we …
… [21] proposed the facehashing scheme and they have argued that using unique tokenized … Goh, “Personalisedcryptographickeygenerationbased on FaceHashing,” Computers & …
… [19] proposed a CPSS for personalized human activity recognition based on 2-dimensional … feature f F , we employed the FaceHashing technique, which generates the feature vector x F …
S Arora, MPS Bhatia - Recent Advances in Computer Science …, 2021 - ingentaconnect.com
… of a block cipher along with a strong cryptographic hashing … Base Algorithm (AMBA) [6] was used to generate secret key … further encrypted using Advanced Encryption Standard (AES) …
… The latter has motivated the scientific literature to investigate new customised procedures … lable FaceHashing technique based on non-invertible transformation with encryption and …
D Sharma, A Selwal - International Conference on Information …, 2020 - Springer
… creating a secure cryptographickey which is based on MBS (… template generation and Cryptographickeygeneration. At first… In the last, a secure cryptographickey with a size 256-bit was …
K Srinivas, V Janaki, V Shankar… - Advanced Informatics for …, 2021 - Springer
… Therefore, both the algorithm technique and keygeneration methodology are equally … that includes cryptokeygeneration and cryptokey protection where the protected key and its …
… Eventually, every individual binary string is concatenated to form the encryptionkey for … and discriminative keys. In this paper, we propose a novel method to generateencryptionkeys …
… As the e-learning environment is directed toward improving student personalized learning, … encryption methods are far better than the classical and traditional facehashing algorithms. …