Dynamic Authentication over Graphical Passwords using Visual Cryptography
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 10
Abstract
CAPTCHA is a test build by computer programs which human can pass but computer programs cannot pass CAPTCHA as graphical passwords (CaRP) are a graphical password scheme used for a user access authentication. It is mainly used for a security purpose to avoid the spyware attacks from website. Using this CaRP to protect the attacks from spyware access a new model to take the new experienced image spaces trouble in well graphical password taken such as different Points which is extends to insufficient password selections. Captcha is provide security , but it take s sensible security and usability and comes out to fit well with some practical lotions for different online security Captcha as graphical passwords is mixed the numbers strings and a graphical password model We take different reviewing authentication model Two Factor Authentication (2FA) is devices such as tokens and ATM cards is taken number of short comings is associated with resent passwords but they include the cost of purchasing, issuing, and managing the Tokens or cards.
Authors and Affiliations
Sirisha. G, V. Suryanarayana
A Survey: Optimization of Backoff Algorithm for Wireless Mobile Adhoc Network
Media access control (MAC) layer is a very important layer in wireless sensor networks. The media access control data communication protocol sub layer also known as the medium access control. It provide addressing an...
Fixed Point Lms Adaptive Filter Using Partial Product Generator
The area and power efficiency is very important for every circuit and its applications. Here I present an efficient architecture of adaptive filter with partial product generator and delayed lms algorithm is also used...
Para-Scheduling Algorithm for Architectural Framework of Virtual Computing Lab
Our main concern in private cloud computing is to provide sufficient computing resources on demand, however in current architectures like eucalyptus, cluster controller is the sole provider of virtual machines to the...
Enhancement of the image by using Histogram Modification and High-pass Filtering Mask
Generally the major problem is low contrast image analysis in medical Field. Low contrast digital images reduce the ability of observer in analyzing the image. This low contrast images are obtained from low radiated...
Local Sharing of Multiple Torrents in Peer to Peer System
The rapid growth traffic of Peer-toPeer applications, especially BitTorrent, is putting a lot of pressure to Internet Service Providers. In this paper, we examine the existence of the locality through a large-scale hy...