2006
DOI: 10.1155/wcn/2006/73685
|View full text |Cite
|
Sign up to set email alerts
|

Mutual Image-Based Authentication Framework with JPEG2000 in Wireless Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Ginesu et al [ 31 ] presented a novel mutual image-based authentication framework. It is a challenge-response scheme that uses a visual password and image scrambling.…”
Section: Classification Of Active Image Forgery Detectionmentioning
confidence: 99%
“…Ginesu et al [ 31 ] presented a novel mutual image-based authentication framework. It is a challenge-response scheme that uses a visual password and image scrambling.…”
Section: Classification Of Active Image Forgery Detectionmentioning
confidence: 99%
“…Image based mutual authentication [12] has become now more reliable, when the scrambling technique applied [7].Users will me users should keep the click points to enter into the system, because the image get scrambled and it will be rearranged according to the scrambling algorithm discussed above. User have the provision to select his favorite areas according to his interest.…”
Section: Implementation Aspectsmentioning
confidence: 99%
“…Recently, a number of good solutions have been proposed for authenticating the image data stream in the presence of random packet loss. For example: 1.A novel mutual image-based authentication framework [13] has been presented. It consists in a challenge-response scheme based on visual password and image scrambling.…”
Section: Literature Review and Present State Of Artmentioning
confidence: 99%
“…Further, wavelet transforms can generally be computed in linear time, thus allowing for fast algorithms. Most conventional wavelet-based image authentication schemes reported in the literature have three shortcomings [13][14][15]:…”
Section: Decompose the Image Using Secrete Parameterized Wavelet Filtermentioning
confidence: 99%