visual authentication
Recently Published Documents


TOTAL DOCUMENTS

19
(FIVE YEARS 6)

H-INDEX

4
(FIVE YEARS 0)

Author(s):  
Kimberly L. Berk ◽  
Steven M. Blum ◽  
Vanessa L. Funk ◽  
Yuhua Sun ◽  
In-Young Yang ◽  
...  

2020 ◽  
Vol 41 (2) ◽  
pp. 117
Author(s):  
Rodrigo dos Santos Cicareli ◽  
José Carlos Pizolato Junior

Fraud and counterfeiting have caused various inconveniences to manufacturers and the product consumer market. To avoid counterfeiting and, therefore, bring a higher level of trust and security in commercial transactions, several authentication techniques for physical products have been proposed. Among the techniques commonly employed, the most popular are QR codes (Quick Response Code), Holographic Seals, and RFID (Radio Frequency Identification) tags. This paper aims to propose an alternative product authentication system that applies the visual cryptography technique (NAOR; SHAMIR, 1995). This system employs two masks that, when overlaid, allow visual authentication by the user, without the need for any computational processing. The use of this authentication system for the need in question has not yet been reported in the literature.


2020 ◽  
Vol 4 (1) ◽  
pp. 69-78
Author(s):  
Aka Kurnia S F ◽  
Muhammad Syukron Anshori

The purpose of this research is to reflect back 200 years of the eruption of Tambora on the island of Sumbawa, West Nusa Tenggara through travel with a photographic study approach, specifically travel photography. Since its inception, photography has played a constitutive role in shaping a travel record, this is also comparable to the importance of that role as a depiction of social identity (Osborne, 2000). In addition, travel photography is also a way to see experiences through visual authentication (Hilman Wendy, 2007). Mount Tambora erupted in April 1815, impacting global climate change and natural disasters which claimed 84,000 lives on the island of Sumbawa, and buried the Tambora kingdom and Concentrated .. Based on the results of research, researchers see the occurrence of reconstruction in the history of the eruption of Tambora which is not only seen as a mountain, but also as an identity in the social structure of society in the form of photography. A photographer has the authority to create a reality from pre-travel to post-travel.


2018 ◽  
Vol 7 (3.12) ◽  
pp. 374
Author(s):  
Mainejar Yadav ◽  
Ranvijay .

Visual Secret Sharing (VSS) is an increased applicability of traditional secret sharing. In VSS, the secret information is recovered by human visual system or lightweight computational device. There are two models available in VSS, one is Visual Cryptography (VC) which is introduced by Naor's in 1994 and other is a Random Grid (RG) based VSS which is proposed by Keren and Kafri. This state of the art covers both the models of VSS along with its application. The various application areas of VSS are visual authentication and identification, image encryption, access control, data hiding etc. The chapter has also covered various future enhancements in VC based on cryptanalysis, optimal pixel expansion, multiple secret encoding, progressive VC etc. Random Grid based VSS have some advantages over VC, which eliminates the need of Pixel expansion and codebook. But still, there is scope for the improvements in the contrast and the complexity of exiting algorithms. So there are various challenges and opportunities which make it an exciting research area to work upon. 


Author(s):  
Prof. Archana Jadhav ◽  
◽  
Neemish Chavan ◽  
Ashish Chavan ◽  
Lokesh Bhoir ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document