403
Views
8
CrossRef citations to date
0
Altmetric
Research Article

Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimization

, ORCID Icon & ORCID Icon

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (1)

Mohammed Elwan, Amira Salem, Hossam Fawky & Ahmed Mahmoud ramadan. (2023) Intelligent security sanitizing gate. Information Security Journal: A Global Perspective 32:6, pages 481-493.
Read now

Articles from other publishers (7)

A. S. Sajitha & S. Sridevi Sathya Priya. (2022) Analysis of Various Visual Cryptographic Techniques and their Issues Based on Optimization Algorithms. International Journal of Image and Graphics 23:06.
Crossref
Zafer YALÇIN, Oktay TÜRKDAĞLI, Gökhan DALKILIÇ & Ömer AYDIN. (2023) Authentication with face recognition and sign language using ESP32-CAMESP32-CAM kullanarak yüz tanıma ve işaret dili ile kimlik doğrulama. Deu Muhendislik Fakultesi Fen ve Muhendislik 25:74, pages 481-489.
Crossref
Diego Carrillo-Torres, Jesús Arturo Pérez-Díaz, Jose Antonio Cantoral-Ceballos & Cesar Vargas-Rosales. (2023) A Novel Multi-Factor Authentication Algorithm Based on Image Recognition and User Established Relations. Applied Sciences 13:3, pages 1374.
Crossref
Geo Francis E & S Sheeja. (2022) Towards an Optimal Security Using Multifactor Scalable Lightweight Cryptography for IoT. Towards an Optimal Security Using Multifactor Scalable Lightweight Cryptography for IoT.
Marius Iulian Mihailescu & Stefania Loredana Nita. (2022) A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments. Cryptography 6:1, pages 8.
Crossref
Faiza Al-Shaarani & Adnan Gutub. (2021) Increasing Participants Using Counting-Based Secret Sharing via Involving Matrices and Practical Steganography. Arabian Journal for Science and Engineering 47:2, pages 2455-2477.
Crossref
Doan Minh Trung, Le Thanh Duan, Nghi Hoang Khoa, Phan The Duy, Nguyen Tan Cam & Van-Hau Pham. (2021) Forensics analysis of FacePlay application to seek digital artifacts on data ownership and privacy. Forensics analysis of FacePlay application to seek digital artifacts on data ownership and privacy.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.