0% found this document useful (0 votes)
50 views1 page

Visual Cryptography and Biometrics Security

Visual cryptography and biometrics can strengthen security where user authentication is required, such as accessing interactive media from different environments and devices. Traditional authentication relies on possessing an item or knowing a password, but biometrics offers authenticating based on physical traits like fingerprints or behaviors like signatures. This new paradigm of user authentication using something unique to the individual is important as people seek to access content from varied locations and technologies.

Uploaded by

Apex ishu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views1 page

Visual Cryptography and Biometrics Security

Visual cryptography and biometrics can strengthen security where user authentication is required, such as accessing interactive media from different environments and devices. Traditional authentication relies on possessing an item or knowing a password, but biometrics offers authenticating based on physical traits like fingerprints or behaviors like signatures. This new paradigm of user authentication using something unique to the individual is important as people seek to access content from varied locations and technologies.

Uploaded by

Apex ishu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

CONCLUSION OF VISUAL CRYPTOGRAPHY

Visual Cryptography and Biometrics can play an essential role, reinforcing security at all stages
where people authentication is needed. In the early stage, the presence of users and devices,
where the same user might want to access to interactive media contents from different
environments (such as home, car, work, jogging, etc.) and also from different devices or media
(such as CD, DVD, home computer, laptop, PDA,2G/3G/4G mobile phones, game
consoles, etc.) strengthens the need for reliable and universal authentication of users. Traditional
user authentication systems have been based in something that you have (like a key, an
identification card, etc.) or something that you know (like a password, or a PIN). Whereas,
with biometrics, a new user authentication paradigm is added: something that you are (e.g.,
fingerprints or face) or something that you do or produce (e.g., handwritten signature or voice).

You might also like