Dynamic Authentication over Graphical Passwords using Visual Cryptography

Abstract

CAPTCHA is a test build by computer programs which human can pass but computer programs cannot pass CAPTCHA as graphical passwords (CaRP) are a graphical password scheme used for a user access authentication. It is mainly used for a security purpose to avoid the spyware attacks from website. Using this CaRP to protect the attacks from spyware access a new model to take the new experienced image spaces trouble in well graphical password taken such as different Points which is extends to insufficient password selections. Captcha is provide security , but it take s sensible security and usability and comes out to fit well with some practical lotions for different online security Captcha as graphical passwords is mixed the numbers strings and a graphical password model We take different reviewing authentication model Two Factor Authentication (2FA) is devices such as tokens and ATM cards is taken number of short comings is associated with resent passwords but they include the cost of purchasing, issuing, and managing the Tokens or cards.

Authors and Affiliations

Sirisha. G, V. Suryanarayana

Keywords

Related Articles

Wireless Mesh Network Deployed in Disaster Area using Gateway Selection

As known from the history, communication services turns out to be exceedinglyimperative after calamity strike. Wireless Mesh network (WMN) serves as a cost effective technology that yield backbone infrastructure to p...

e-Governance initiatives in the State of Punjab

e-Governance refers to the delivery of services provided by the government through the means of ICTs (Information and Communication Technologies). The NeGP (National e-Governance Plan) is initiated by the Government...

Image Watermarking And Its Techniques: A Review

With the fast development in computer network and multimedia technology, the need of protecting the ownership of digital media becomes a major issue. Digital watermarking is a process of hiding imperceptible data int...

A New Heuristic Approach For Hide Valuable Information Of Organizations

Organizations accumulate and analyze customer data to pick up their services. Access Control Mechanisms(ACM) is used to make sure that only authorized information is on hand to users. Onthe other hand, sensitive info...

To Enable Base Station To Obtain The ‘True’ Estimate Of The Aggregate In The Presence Of The Attack

The sensor nodes appearance a multi-hop network as the base station (BS) proceeds as the central point of control. Wireless sensor networks used in different kinds of applications like Forest monitoring, weather fore...

Download PDF file
  • EP ID EP28269
  • DOI -
  • Views 299
  • Downloads 2

How To Cite

Sirisha. G, V. Suryanarayana (2015). Dynamic Authentication over Graphical Passwords using Visual Cryptography. International Journal of Research in Computer and Communication Technology, 4(10), -. https://europub.co.uk/articles/-A-28269