Open Access
Subscription Access
Open Access
Subscription Access
A Pattern Recognition Approach to Secure Cipher Documents
Subscribe/Renew Journal
This paper addresses public key cryptography concept, which involves the use of asymmetric key algorithms instead of or in addition to symmetric key algorithms. Unlike symmetric key algorithms, it does not require a secure initial exchange of one or more secret keys to both sender and receiver. Use of these keys allows protection of the authenticity of a message by creating a digital signature of a message using the private key, which can be verified using the public key. We present an approach to authenticating photo-ID documents that relies on pattern recognition and public-key cryptography and has security advantages over physical mechanisms that currently safeguard cards, such as optical laminates and holograms.
Keywords
Cryptography, Holograms, Pattern Recognition, Symmetric Key.
User
Subscription
Login to verify subscription
Font Size
Information
Abstract Views: 293
PDF Views: 2