Photographic authentication through untrusted terminals | IEEE Journals & Magazine | IEEE Xplore