Security protection using two different image shadows with authentication. [electronic resource]
- Mathematical biosciences and engineering : MBE 03 2019
- 1914-1932 p. digital
Publication Type: Journal Article; Research Support, Non-U.S. Gov't
1551-0018
10.3934/mbe.2019093 doi
Algorithms Computer Security Computers Deception Humans Image Processing, Computer-Assisted--methods Internet Lie Detection Medical Informatics--methods Programming Languages Software