Stegano-image as a digital signature to improve security authentication system in mobile computing
Authentication of any system means providing a security to that system. Securing confidential information on the mobile platforms has been becoming a typical issue for the specialists. One of the authentication techniques is a textual password based. This type of textual password commonly follows an...
| Main Authors: | Mantoro, Teddy, Permadi, Didit Dwi, Abubakar, Adamu |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
IEEE
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/56726/ http://irep.iium.edu.my/56726/7/iEEE_Stegano_complete.pdf http://irep.iium.edu.my/56726/13/56726_Stegano-image%20as%20a%20digital%20signature%20to%20improve%20security%20authentication%20system%20in%20mobile%20computing_Scopus.pdf |
Similar Items
Secure authentication for sensitive digital systems in mobile devices
by: Hussein, Khalid Waleed
Published: (2016)
by: Hussein, Khalid Waleed
Published: (2016)
Offline Handwritten Signature Watermark for Digital Document Authentication
by: Low, Cheng Yaw
Published: (2008)
by: Low, Cheng Yaw
Published: (2008)
Offline Handwritten Signature Watermark For Digital Document Authentication
by: Yaw, Low Cheng
Published: (2008)
by: Yaw, Low Cheng
Published: (2008)
NFC secured online transaction in mobile computing business
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
Digital Signature-based authentication framework in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Unveiling the support of 3D representation in mobile devices for pedestrians navigation aid
by: Abubakar, Adamu, et al.
Published: (2012)
by: Abubakar, Adamu, et al.
Published: (2012)
Online authentication using smart card technology in mobile phone infrastructure
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
Development of offline handwritten signature authentication using artificial neural network
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
User awareness in the authenticity of mobile Quran apps
by: Talib, Shuhaili, et al.
Published: (2016)
by: Talib, Shuhaili, et al.
Published: (2016)
3D mobile navigation for dynamic users interaction
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
3D graphics visualization for interactive mobile users navigation
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
Digital watermarking for medical image authentication
by: Noor Aqilah, Abdul Halim
Published: (2019)
by: Noor Aqilah, Abdul Halim
Published: (2019)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
On the security of digital signature protocol based on iterated function systems.
by: M. G. AL-Saidi, Nadia, et al.
Published: (2011)
by: M. G. AL-Saidi, Nadia, et al.
Published: (2011)
Multi-user navigation: a 3D mobile device interactive support
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
An improved secure authentication in lightweight IoT
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2023)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2023)
A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents
by: M. Nomani, Kabir, et al.
Published: (2014)
by: M. Nomani, Kabir, et al.
Published: (2014)
A navigation-aided framework for 3D map views on mobile devices
by: Abubakar, Adamu, et al.
Published: (2014)
by: Abubakar, Adamu, et al.
Published: (2014)
Visualizing pathway on 3D maps for an interactive user navigation in mobile devices
by: Mantoro, Teddy, et al.
Published: (2019)
by: Mantoro, Teddy, et al.
Published: (2019)
Securing anonymous authenticated announcement protocol for group signature in internet of vehicle / Nur Afiqah Suzelan Amir
by: Nur Afiqah , Suzelan Amir
Published: (2021)
by: Nur Afiqah , Suzelan Amir
Published: (2021)
Dynamic interactive 3D mobile navigation aid
by: Adamu, Abubakar Ibrahim, et al.
Published: (2012)
by: Adamu, Abubakar Ibrahim, et al.
Published: (2012)
Improving computational complexity using I-zag for text image authentication scheme
by: ‘Aqilah, Abd. Ghani
Published: (2024)
by: ‘Aqilah, Abd. Ghani
Published: (2024)
Recent advances in mobile touch screen security authentication methods: a systematic literature review
by: Ibrahim, Tahir Musa, et al.
Published: (2019)
by: Ibrahim, Tahir Musa, et al.
Published: (2019)
Digital signature algorithm
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Exploring end-user preferences of 3D mobile interactive navigation design
by: Abubakar, Adamu, et al.
Published: (2011)
by: Abubakar, Adamu, et al.
Published: (2011)
Fast and secure handover authentication scheme in Mobile WiMax
by: Zmezm, Hamzah F., et al.
Published: (2014)
by: Zmezm, Hamzah F., et al.
Published: (2014)
Authentication securing methods for mobile identity: issues, solutions and challenges
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2022)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2022)
Security mediated certificateless signatures
by: Yap, Nvun-She, et al.
Published: (2007)
by: Yap, Nvun-She, et al.
Published: (2007)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Multimodality to improve Security and Privacy in Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
Multimodality to improve Security and Privacy in Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
Improved digital signature protocol using iterated function systems.
by: Al-Saidi, Nadia M.G., et al.
Published: (2011)
by: Al-Saidi, Nadia M.G., et al.
Published: (2011)
Metrics evaluation for context-aware computing
by: Mantoro, Teddy
Published: (2009)
by: Mantoro, Teddy
Published: (2009)
Metrics evaluation for context-aware computing
by: Mantoro, Teddy
Published: (2009)
by: Mantoro, Teddy
Published: (2009)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
Web application development process
by: Ibrahim, Adamu Abubakar, et al.
Published: (2011)
by: Ibrahim, Adamu Abubakar, et al.
Published: (2011)
Mobile user location prediction enabled services in ubiquitous computing: determination user location using MFN algorithm
by: Mantoro, Teddy, et al.
Published: (2009)
by: Mantoro, Teddy, et al.
Published: (2009)
A New Proxy Signature Scheme As Secure As ElGamal Signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A digital signature system.
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2010)
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2010)
Secure E-Voting With Blind Signature
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
Similar Items
-
Secure authentication for sensitive digital systems in mobile devices
by: Hussein, Khalid Waleed
Published: (2016) -
Offline Handwritten Signature Watermark for Digital Document Authentication
by: Low, Cheng Yaw
Published: (2008) -
Offline Handwritten Signature Watermark For Digital Document Authentication
by: Yaw, Low Cheng
Published: (2008) -
NFC secured online transaction in mobile computing business
by: Mantoro, Teddy, et al.
Published: (2012) -
Digital Signature-based authentication framework in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2012)