Authentication in Insecure Environments Using Visual Cryptography and Non-Transferable Credentials in Practise | EKB DL