QR CODE BASED ENCRYPTED MATRIX REPRESENTATION FOR ERADICATING HARDWARE AND SOFTWARE KEYLOGGING
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 2015, Vol 4, Issue 4
Abstract
The design of secure authentication protocols is quite challenging. Involving human authentication protocols is not easy because of their limited capability of computation and memorization. Keylogging is a major problem faced in internet banking. Keylogger is a software designed to capture all a users keyboard strokes and then make use of them to impersonate a user in financial transaction, also relying on users to enhance security necessary degrades the usability. In order to enhance security as well as usability here we use RSA algorithm which avoid some problems in e-banking such as session hijacking , monitoring using video sensor etc. By providing unique key to the users after scanning the QR code available in screen. According to the unique key,the user will be given a specific 4*4 matrix keyboard in user’s smart phone which reposition the keys every time inorder to avoid hacking. To that end, there are two visual authentication protocols: one is a one-time-password protocol, and the other is a password-based authentication protocol. Through rigorous analysis, we verify that our protocols are immune to many of the challenging authentication attacks applicable in the literature.
Authors and Affiliations
R. Sangeetha , N. HarshaVinodha , A. V. Kalpana
IP Over DWDM
This paper completely deals with optical signal transmission; with encapsulation entire raw packets are converted as optical signals. Since the usage of internet and intranet are increasing day by day, the demands...
Ancient Tamil Vattezhutthu Alphabets Recognition in Stone Inscription Using Wavelet Transform and SVM Classifier
This paper presents the application of wavelet processing in the domain of Tamil Vattezhutthu alphabets recognition in Stone inscription. To attain high recognition rate, robust feature extractors and powerful classifie...
REVIEW OF SOME COMPARISONS BETWEEN PHP AND ASP.NET FROM THE VIEWPOINT OF A NOVICE PROGRAMMER
At the present time websites produce dynamic response to the user requests. So there is a need of dynamic web scripting languages. A webpage is server-side dynamic page whose structure is controlled by server-side...
Aggregate Query Processing using Random walk approach in Dynamic Environment
Peer-to-peer (P2P) network is increasingly becoming popular because it offers oppor¬tunities for real-time communication, ad-hoc collaboration and information sharing in a large-scale distributed environment. Peer...
REVIEW OF CLUSTERING UNCERTAIN DATA
Clustering on uncertain data, one of the essential tasks in mining uncertain data, posts significant challenges on both modeling similarity between uncertain objects and developing efficient computational methods....