Image Based Authentication for Folder Security using Persuasive Cued Click-Points and SHA

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2

Abstract

 Abstract: In this paper Image Based Authentication application is applied on folder’s (folders that are confidential to user) ,since the studies till date have shown that textual passwords are more prone that they are well hacked by hackers through easily available software’s or programming different code to hack the password. The textual passwords use languages that can be identified using the grammar that they use, therefore our project focuses on Graphical passwords , because as such it has been observed that human brains is better at re-collecting and recognizing images than text, the images are well captured and stored rather than text. There have been phases in creating a strong graphical password scheme from 1999, with the promise that the graphical passwords would provide improved password memorability and usability. The technique that we use here is PCCP (PERSUASIVE CUED CLICK POINTS), this is a combination of recall and recognition based techniques with the implementation of SHA1 (Secure Hash Algorithm). Here PCCP is used for user to h

Authors and Affiliations

Suraj Hande, , Nitin Dighade , Ruchal Bhusari, , Mrunali Shende, , Prof. Heena Agrawal

Keywords

Related Articles

 Secure Image Hiding Algorithm using Cryptography and Steganography

 In the present scenario, any communication of internet and networks application requires security.Lots of data security and data hiding algorithms have been developed in the last decade.Cryptography  and ste...

 A Survey on Balancing the Network Load Using GeographicHash Tables

 Abstract: The load Balancing in the network is a severe problem in network. The data created in wirelessnetwork is kept on node. It accessed over geographic hash table. The geographic hash table is used to recoverd...

 An encrypted mechanism for securing cloud data from data mining attacks

 Abstract: Cloud Computing is a vast infrastructural and rising pool which provides huge storage of data in one sphere. Organizations nowadays are in the marathon of equipping the whole system in a cloud form. In th...

 HMM and its application in MSA

 Abstract: This document gives an insightinto HMM and its application in context of Multiple sequence alignment (MSA). Various computational approaches proliferatedin response to resolve the complexities of Human...

 Detecting Masquerade in Face Recognition System – A Literature  survey

 A masquerader is an (often external) attacker is one who, after succeeding in obtaining a legitimateuser’s credentials, attempts to use the stolen identity to carry out malicious actions.Automatic detection of...

Download PDF file
  • EP ID EP110533
  • DOI 10.9790/0661-162912412
  • Views 117
  • Downloads 0

How To Cite

Suraj Hande, , Nitin Dighade, Ruchal Bhusari, , Mrunali Shende, , Prof. Heena Agrawal (2014).  Image Based Authentication for Folder Security using Persuasive Cued Click-Points and SHA. IOSR Journals (IOSR Journal of Computer Engineering), 16(2), 124-128. https://europub.co.uk/articles/-A-110533