Image Authentication Schemes against Key-Logger Spyware | IEEE Conference Publication | IEEE Xplore