Enhancing home security through visual cryptography
Home security systems in the recent times have gained greater importance due to
increasing threat in the society. Biometrics deals with automated approaches of recognizing …
increasing threat in the society. Biometrics deals with automated approaches of recognizing …
A novel color visual cryptography approach based on Harris Hawks Optimization Algorithm
D Ibrahim, R Sihwail, KAZ Arrifin, A Abuthawabeh… - Symmetry, 2023 - mdpi.com
Hundreds of millions of people worldwide use computing devices and services, including
smartphones, laptops, and messaging apps. Visual cryptography (VC) is one of the most …
smartphones, laptops, and messaging apps. Visual cryptography (VC) is one of the most …
Multi-WiIR: Multi-user identity legitimacy authentication based on WiFi device
Z Wei, Y Dong - Future Internet, 2024 - mdpi.com
With the proliferation of WiFi devices, WiFi-based identification technology has garnered
attention in the security domain and has demonstrated initial success. Nonetheless, when …
attention in the security domain and has demonstrated initial success. Nonetheless, when …
Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimization
DR Ibrahim, JS Teh, R Abdullah - Information Security Journal: A …, 2021 - Taylor & Francis
Facial recognition as an authentication factor requires that facial images and features are
tamper-free. Visual cryptography (VC) is commonly used for this purpose but leads to …
tamper-free. Visual cryptography (VC) is commonly used for this purpose but leads to …
An enhanced color visual cryptography scheme based on the binary dragonfly algorithm
DR Ibrahim, R Abdullah, JS Teh - International Journal of …, 2022 - Taylor & Francis
Visual cryptography is an encryption technique that decomposes a secret image into
multiple shares that are digitally 'overlapped'based on logical operations to recover the …
multiple shares that are digitally 'overlapped'based on logical operations to recover the …
Authentication and secure communication by Haar Cascade Classifier, Eigen Face, LBP Histogram and variable irreducible polynomial in (28 ) finite field
I Das, A Sarkar, S Singh… - 2021 Devices for …, 2021 - ieeexplore.ieee.org
One of the most common way of verification is 'Face Recognition'which can also be
implemented for communication between machines and humans. In industries, corporate …
implemented for communication between machines and humans. In industries, corporate …
[PDF][PDF] A Novel Color Visual Cryptography Approach Based on Harris Hawks Optimization Algorithm. Symmetry 2023, 15, 1305
D Ibrahim, R Sihwail, KAZ Arrifin, A Abuthawabeh… - 2023 - academia.edu
Hundreds of millions of people worldwide use computing devices and services, including
smartphones, laptops, and messaging apps. Visual cryptography (VC) is one of the most …
smartphones, laptops, and messaging apps. Visual cryptography (VC) is one of the most …
[PDF][PDF] An enhanced color visual cryptography scheme based on the binary dragonfly algorithm
DR Ibrahima, R Abdullaha, JS Tehb - researchgate.net
Visual cryptography is an encryption technique that decomposes a secret image into
multiple shares that are digitally “overlapped” based on logical operations to recover the …
multiple shares that are digitally “overlapped” based on logical operations to recover the …