Gil-Je Lee, Dae-Soo Kim, and Kee-Young Yoo
Access Control, Visual secret sharing, Visual Cryptography, QR code, Data Hiding
The previous access control systems have high computation with the persons biometric information, cryptography, and so on. However, the embedding and extraction process of proposed scheme is simple and efficiency because of this paper is proposed by using data hiding and the visual secret sharing. When the user try to the access system, it is provided to the triple authentication of user that the extracted QR code image and the secret image are verified with the secret key of user.
Important Links:
Go Back