Securing Web Accounts Using Graphical Password Authentication through Watermarking
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 6
Abstract
Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user-friendly password-based method has been on the agenda of security researchers for a long time. On one hand, there are password manager programs which facilitate generating site-specific strong passwords from a single user password to eliminate the memory burden due to multiple passwords. On the other hand, there are studies exploring the viability of graphical passwords as a more secure and user-friendly alternative. In this project, we propose a new graphical password scheme for accessing web accounts called “Secure Web Account Access through Recognition Based Graphical Password by Watermarking”. Here user selects number of images as a password and while login user needs to enter the random code generated below each image, which has been set as a password. Here the security of the system is very high and every time user needs to enter different set of code for authentication i.e. every time new password gets generated making Dictionary attacks, Brute Force attack, and other attacks infeasible.
Authors and Affiliations
Vinit Khetani , Jennifer Nicholas , Anuja Bongirwar , Abhay Yeole
Implementation of Lifting-Based Two Dimensional Discrete Wavelet Transform on FPGA Using Pipeline Architecture
This paper presents the implementation of the high speed lifting-based two dimensional discrete wavelet transform (2D-DWT) algorithm on Field Programmable Gate Array (FPGA). Pipelining structure in DWT reduces hardware c...
Intensity and Texture Gradient Based Boundary Detection Algorithm for Medical Image[i][/i]
In today’s technological world images plays a very important role. Images are very helpful in several fields like non-destructive testing. Medical diagnostics, surveillance and military etc. in image analysis and compute...
Enhancing Rural Development in Tamilnadu through ICT: An Evaluation of Latest Technologies in the scheme MGNREGS
When e-governance indicates better governance, naturally, rural development becomes an essential part of it. It is so because developing countries like India depend on the villages and their welfare. Keeping this in mind...
Tree Based Multicast Routing Protocols for Ad Hoc Networks
The very important dispute in Multicast routing protocols for Manets below host quality and information measure restraint is generating multi-hop routing. In Manets Multicast routing features a very important half. a ran...
Survey on Sparse Coded Features for Content Based Face Image Retrieval
Content based image retrieval, a technique which uses visual contents of image to search images from large scale image databases according to users' interests. This paper provides a comprehensive survey on recent technol...