AUTHENTICATION OF GRAPHICAL PASSWORD SYSTEM BASED ON AUDIO SIGNATURE AND IMAGES
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 3
Abstract
Cyber-attacks as amplified at an incredible rate in the preceding decade. Due to this inclined data like Bank financial credit details, login details of the accounts are not protected. Thus to argue against this we need a forceful authentication technique. In recent years different types of high-speed authentication systems are previously being urban such as token based, biometrics system, captcha etc. Each of the alive methods has their own intrinsic worth and demerits. So in this paper we proposed a new model for the authentication using integration of sound and image based password system. This system is difficult to satire and the safety measures principles cannot be breached easily.
Authors and Affiliations
Latha. R
[b]Analysis of Geothermal Cooling System F [/b]
Energy used for space heating and cooling accounts for almost one in the prices of fuels and electricity cost has led to the use of alternate energy sources like geothermal energy to used for heating and cooling....
On Two Stage Open Shop Scheduling in Which Processing Time, Set Up Time Associated with Probabilities Including Job Block Criteria
The present paper is an attempt through heuristic method to obtain the optimal sequence for n jobs two stage open shop problem in which Set up time separated from processing times, each associated with respective proba...
DEVELOPMENT OF CONTENT BASED IMAGE RETRIEVAL SYSTEM USING NEURAL NETWORK & MULTI-RESOLUTION ANALYSIS
In this paper proposed the content based image retrieval one of most technique of data and multimedia technology. As image collections are growing at a rapid rate, and demand for efficient and effective tools for retriev...
Re-Encryption Scheme to Provide Secure Data Forwarding in Cloud Storage System
A cloud storage system is considered as a large scale distributed storage system which consists of several independent storage servers. In Cloud computing the resources on the Internet are considered and managed as a co...
Voltage Swell mitigation in Wind Farm System
As the wind power penetration into the grid is increasing quickly, the influence of wind turbine on the power quality is becoming an important issue. Wind power penetration is the impact on power system stability....