[PDF][PDF] Authentication System using Secret Sharing

NM Agrawal, C Sipna, PR Deshmukh - … on Recent and Innovation Trends in … - core.ac.uk
Security using Authentication system is an important concern in the field of information
technology. It is an important thing as per as concern to the ruling of internet over people …

[PDF][PDF] Secret sharing based secure authentication system

RS Patil, S Patil, SD Thepade - International Journal of Computer …, 2015 - Citeseer
The growth in the usage of internet has increased the demand for fast and accurate user
identification and authentication. New threats, risks and vulnerabilities emphasize the need …

Enhancing security and privacy in biometrics based authentication system using multiple secret sharing

S Patil, K Tajane, J Sirdeshpande - … Conference on Computing …, 2015 - ieeexplore.ieee.org
A biometric authentication system acquires biometric sample such as fingerprint from the
subject. The fingerprint signifies physiological features of an individual. This biometric …

[PDF][PDF] Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme

S Sharma - International Journal of Computer Sciences and …, 2016 - researchgate.net
The digital signature system is more powerful than the authentication systems, because the
digital signatures support both authentication and non-repudiation. Non-repudiation is …

Biometric Extensions for Secret Sharing Protocols

L Ogiela, MR Ogiela - 2015 2nd International Conference on …, 2015 - ieeexplore.ieee.org
In this paper authors will present a new idea of application of selected biometric pattern for
creation cryptographic protocols, dedicated for secret sharing and data distribution. The …

[PDF][PDF] Biometric privacy using secret image sharing

AT Hashim, DA Noori - Engineering and Technology Journal, 2017 - iasj.net
Biometric technique includes uniquely identifying person based on their physical or
behavioral characteristics. It is mainly used for authentication. Iris scanning is one of the …

Design and implementation of secure biometric based authentication system using rfid and secret sharing

S Patil, P Dhumal, S Lokhande… - 2017 2nd International …, 2017 - ieeexplore.ieee.org
Biometric data refers to metrics related to unique human characteristics like fingerprint, iris,
face recognition, voice, palm print, etc. Various security threats are raised while handling …

Hierarchical threshold secret sharing scheme for color images

M Fathimal - Multimedia Tools and Applications, 2017 - Springer
The applications that use pattern recognition via secret sharing are seldom linear,
straightforward and uncomplicated. The layers of complexity grows as the process turns …

[PDF][PDF] Survey of Various Secret Sharing Scheme

UB Patel - International Journal of Scientific Research in Science …, 2016 - academia.edu
ABSTRACT A Secret Sharing is a technique for increasing the security of sensitive
information. Secret Sharing is that a secret will be Split into a number of pieces between a …

Double layer secure secret images sharing scheme for biometrics

E Gunasekaran, V Muthuraman - Distributed and Parallel Databases, 2022 - Springer
Biometric strategy is primarily followed for authentication which incorporates the distinct
recognition of the individual depending on their physical or behavioral features. Among all …