Dynamic Authentication over Graphical Passwords using Visual Cryptography
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 10
Abstract
CAPTCHA is a test build by computer programs which human can pass but computer programs cannot pass CAPTCHA as graphical passwords (CaRP) are a graphical password scheme used for a user access authentication. It is mainly used for a security purpose to avoid the spyware attacks from website. Using this CaRP to protect the attacks from spyware access a new model to take the new experienced image spaces trouble in well graphical password taken such as different Points which is extends to insufficient password selections. Captcha is provide security , but it take s sensible security and usability and comes out to fit well with some practical lotions for different online security Captcha as graphical passwords is mixed the numbers strings and a graphical password model We take different reviewing authentication model Two Factor Authentication (2FA) is devices such as tokens and ATM cards is taken number of short comings is associated with resent passwords but they include the cost of purchasing, issuing, and managing the Tokens or cards.
Authors and Affiliations
Sirisha. G, V. Suryanarayana
Wireless Mesh Network Deployed in Disaster Area using Gateway Selection
As known from the history, communication services turns out to be exceedinglyimperative after calamity strike. Wireless Mesh network (WMN) serves as a cost effective technology that yield backbone infrastructure to p...
e-Governance initiatives in the State of Punjab
e-Governance refers to the delivery of services provided by the government through the means of ICTs (Information and Communication Technologies). The NeGP (National e-Governance Plan) is initiated by the Government...
Image Watermarking And Its Techniques: A Review
With the fast development in computer network and multimedia technology, the need of protecting the ownership of digital media becomes a major issue. Digital watermarking is a process of hiding imperceptible data int...
A New Heuristic Approach For Hide Valuable Information Of Organizations
Organizations accumulate and analyze customer data to pick up their services. Access Control Mechanisms(ACM) is used to make sure that only authorized information is on hand to users. Onthe other hand, sensitive info...
To Enable Base Station To Obtain The ‘True’ Estimate Of The Aggregate In The Presence Of The Attack
The sensor nodes appearance a multi-hop network as the base station (BS) proceeds as the central point of control. Wireless sensor networks used in different kinds of applications like Forest monitoring, weather fore...