Visual cryptography for general access structures
Information and Computation
Intelligent biometric techniques in fingerprint and face recognition
Intelligent biometric techniques in fingerprint and face recognition
New Colored Visual Secret Sharing Schemes
Designs, Codes and Cryptography
Extended capabilities for visual cryptography
Theoretical Computer Science
Visual Authentication and Identification
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Sharing a Secret Gray Image in Multiple Images
CW '02 Proceedings of the First International Symposium on Cyber Worlds (CW'02)
Visual Cryptography
User Authentication based on Face Recognition with Support Vector Machines
CRV '06 Proceedings of the The 3rd Canadian Conference on Computer and Robot Vision
Colored visual cryptography without color darkening
Theoretical Computer Science
Déjà Vu: a user study using images for authentication
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
SIAM Journal on Computing
Password-based encryption analyzed
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Hi-index | 0.00 |
We exhibit a system for improving the quality of user-derived keying material on touch-screen devices. We allow a device to recover previously generated, highly entropic data suitable for use as (part of) a strong secret key from a user's act of identifying to the device. Our system uses visual cryptography [21], using no additional electronics and no memorization on the part of the user. Instead, we require the use of a transparency overlaid on the touch-screen. Our scheme is similar to the identification scheme of [22] but tailored for constrained, touch-screen displays.