A searchable encryption scheme with biometric authentication and authorization for cloud environments

MI Mihailescu, SL Nita - Cryptography, 2022 - mdpi.com
Cloud computing offers the possibility of providing suitable access within a network for a set
of resources. Many users use different services for outsourcing their data within the cloud …

A novel multi-factor authentication algorithm based on image recognition and user established relations

D Carrillo-Torres, JA Pérez-Díaz… - Applied Sciences, 2023 - mdpi.com
Conventional authentication methods, like simple text-based passwords, have shown
vulnerabilities to different types of security attacks. Indeed, 61% of all breaches involve …

Ghost imaging-based optical multilevel authentication scheme using visual cryptography

Y Kang, S Kanwal, S Pu, B Liu, D Zhang - Optics Communications, 2023 - Elsevier
As a nonlocal imaging approach, ghost imaging is of potential significance for information
security. This study demonstrates a multi-level authentication approach relying on ghost …

Data Privacy Protection in Cloud Computing Using Visual Cryptography

NM Sultana, K Srinivas - Multimedia Tools and Applications, 2024 - Springer
Visual cryptography is a cryptographic methodology designed to secure visual information in
a way that it can be effortlessly deciphered through human vision. As an emerging …

Towards an Optimal Security Using Multifactor Scalable Lightweight Cryptography for IoT

S Sheeja - … on Communication, Computing and Industry 4.0 …, 2022 - ieeexplore.ieee.org
With the growth of the number in smart devices based on IoT, keeping a secure data
processing among them has become even more significant in cloud computing. However, a …

XVC scheme-based secret sharing model with hybrid optimization algorithm for visual cryptography

M Kumar, S Shekhar - Signal, Image and Video Processing, 2024 - Springer
Visual cryptography (VC) is a model that permits visual data in an encrypted manner in such
a way that decrypted data occurs in the form of visual image. A scheme is modeled for secret …

Analysis of Various Visual Cryptographic Techniques and Their Issues Based on Optimization Algorithms

AS Sajitha, SSS Priya - International Journal of Image and Graphics, 2023 - World Scientific
Visual Cryptography (VC) is a process employed for the maintenance of secret information
by hiding the secret messages that are embedded within the images. Typically, an image is …

Intelligent security sanitizing gate

M Elwan, A Salem, H Fawky… - … Security Journal: A …, 2023 - Taylor & Francis
It is very difficult to keep track of employee attendance manually. In addition to the length of
time that the registration process takes, there are still chances that some errors may occur …

A Systematic Review of User Authentication Security in Electronic Payment System

MA Hassan, Z Shukur - Proceedings of International Conference on Data …, 2023 - Springer
Recently, security is becoming an increasingly crucial component of any financial
organization, and as a result, the need for authentication has expanded. To ensure the …

[PDF][PDF] FMDB Transactions on Sustainable Computing Systems

KD Jasper, ASV Raja, R Neha, SS Rajest, R Regin… - 2023 - researchgate.net
Identity and Access Management (IAM) system aimed at enhancing security, streamlining
authentication processes, enforcing access controls, and monitoring user activities …