Developers have expanded availability of digital identity and biometrics, but traditional methods are holding strong. Most companies still rely on usernames and passwords, though a significant portion ...
There are more headlines each day about hacks and data breaches that can be blamed on authentication shortcomings, yet industry news claims that new authentication methods are making us more secure.
Despite the astronomical growth of smartphones and tablets, and the rise in applications allowing consumers to purchase both virtual and real goods from their mobile devices, mobile commerce still ...
I’m still on my quest to find good user authentication techniques that can supplement or replace the old username and password scheme. In this age of spoofing, phishing and stolen IDs, we need strong ...
Image hashing is a critical technology in digital imaging that converts a visual representation into a compact, binary code uniquely reflecting its perceptual content. This technique is especially ...
A new login authentication approach could improve the security of current biometric techniques that rely on video or images of users' faces. Known as Real-Time Captcha, the technique uses a unique ...