IoT Authentication Protocols: Classification, Trend and Opportunities

AN Alsheavi, A Hawbani, X Wang… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
This paper reviews three main aspects of authentication protocols of Internet of Things (IoT):
classifications and limitations, current trends, and opportunities. First, we explore the …

Protection of online images against theft using robust multimodal biometric watermarking and T-norms

JJ Fernandez, NP - Multimedia Tools and Applications, 2024 - Springer
Online image theft is a severe concern faced by many photographers. It occurs when
someone uses the photo they took accidentally or deliberately without getting the permission …

Biometric watermarking: an application-based review

JJ Fernandez, P Nithyanandam - International Journal of …, 2023 - inderscienceonline.com
The advancement of technology will require us to improve the security of data being
transmitted. Nowadays, biometric authentication systems are used in many sectors …

Augmenting the detection of online image theft using diagonal transformation and iris biometric watermarking

JJ Fernandez, N Pandian, R Chavali… - … of Information and …, 2022 - inderscienceonline.com
The digitisation of data has brought in various social media platforms where a lot of data are
compromised every day. Likewise, there is a possibility of theft for every photo published …