Enhancing home security through visual cryptography

J Mohan, R Rajesh - Microprocessors and Microsystems, 2021 - Elsevier
Home security systems in the recent times have gained greater importance due to
increasing threat in the society. Biometrics deals with automated approaches of recognizing …

A novel color visual cryptography approach based on Harris Hawks Optimization Algorithm

D Ibrahim, R Sihwail, KAZ Arrifin, A Abuthawabeh… - Symmetry, 2023 - mdpi.com
Hundreds of millions of people worldwide use computing devices and services, including
smartphones, laptops, and messaging apps. Visual cryptography (VC) is one of the most …

Multi-WiIR: Multi-user identity legitimacy authentication based on WiFi device

Z Wei, Y Dong - Future Internet, 2024 - mdpi.com
With the proliferation of WiFi devices, WiFi-based identification technology has garnered
attention in the security domain and has demonstrated initial success. Nonetheless, when …

Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimization

DR Ibrahim, JS Teh, R Abdullah - Information Security Journal: A …, 2021 - Taylor & Francis
Facial recognition as an authentication factor requires that facial images and features are
tamper-free. Visual cryptography (VC) is commonly used for this purpose but leads to …

An enhanced color visual cryptography scheme based on the binary dragonfly algorithm

DR Ibrahim, R Abdullah, JS Teh - International Journal of …, 2022 - Taylor & Francis
Visual cryptography is an encryption technique that decomposes a secret image into
multiple shares that are digitally 'overlapped'based on logical operations to recover the …

Authentication and secure communication by Haar Cascade Classifier, Eigen Face, LBP Histogram and variable irreducible polynomial in (28 ) finite field

I Das, A Sarkar, S Singh… - 2021 Devices for …, 2021 - ieeexplore.ieee.org
One of the most common way of verification is 'Face Recognition'which can also be
implemented for communication between machines and humans. In industries, corporate …

[PDF][PDF] A Novel Color Visual Cryptography Approach Based on Harris Hawks Optimization Algorithm. Symmetry 2023, 15, 1305

D Ibrahim, R Sihwail, KAZ Arrifin, A Abuthawabeh… - 2023 - academia.edu
Hundreds of millions of people worldwide use computing devices and services, including
smartphones, laptops, and messaging apps. Visual cryptography (VC) is one of the most …

[PDF][PDF] An enhanced color visual cryptography scheme based on the binary dragonfly algorithm

DR Ibrahima, R Abdullaha, JS Tehb - researchgate.net
Visual cryptography is an encryption technique that decomposes a secret image into
multiple shares that are digitally “overlapped” based on logical operations to recover the …

[引用][C] A DECENTRALIZED MULTI-FACTOR USER AUTHENTICATION SCHEME FOR THE INTERNET OF THINGS SYSTEM