Image Based Authentication for Folder Security using Persuasive Cued Click-Points and SHA
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: In this paper Image Based Authentication application is applied on folder’s (folders that are confidential to user) ,since the studies till date have shown that textual passwords are more prone that they are well hacked by hackers through easily available software’s or programming different code to hack the password. The textual passwords use languages that can be identified using the grammar that they use, therefore our project focuses on Graphical passwords , because as such it has been observed that human brains is better at re-collecting and recognizing images than text, the images are well captured and stored rather than text. There have been phases in creating a strong graphical password scheme from 1999, with the promise that the graphical passwords would provide improved password memorability and usability. The technique that we use here is PCCP (PERSUASIVE CUED CLICK POINTS), this is a combination of recall and recognition based techniques with the implementation of SHA1 (Secure Hash Algorithm). Here PCCP is used for user to h
Authors and Affiliations
Suraj Hande, , Nitin Dighade , Ruchal Bhusari, , Mrunali Shende, , Prof. Heena Agrawal
High Performance Data Encryption based on AdvancedEncryption Standard using FPGA
Abstract: Many digital services, such as confidential video conferencing, medical, military imaging systemsand the rapid progress of Internet, require reliable security and encryption in real time to store and tran...
Aspect Based Sentiment Analysis Survey
Abstract:Sentiment analysis or Opinion mining is becoming an important task both from academics and commercial standpoint. In recent years text mining has become most promising area for research. There is an exponential...
Secure Code Based Mostly Information Forwarding System in Cloud Storage
Cloud Computing may be a technology that treats the resources on the net as a combined entity, a cloud. This project addresses the matter of forwarding information to a different user by storage servers directly ben...
Intrusion Detection system: A Review of the state of the art
Intrusion detection system is a software which is used to monitor network for anyintrusion .There are various types of IDS which are stated as Anomaly based, Host based, Network based and Signature based. In this...
Protection of Direct and Indirect Discrimination using Prevention Methods
Along with privacy, discrimination is a very important issue when considering the legal and ethical aspects of data mining. It is more than observable that the majority people do not want to be discriminated &nbs...