QR CODE BASED ENCRYPTED MATRIX REPRESENTATION FOR ERADICATING HARDWARE AND SOFTWARE KEYLOGGING

Abstract

 The design of secure authentication protocols is quite challenging. Involving human authentication protocols is not easy because of their limited capability of computation and memorization. Keylogging is a major problem faced in internet banking. Keylogger is a software designed to capture all a users keyboard strokes and then make use of them to impersonate a user in financial transaction, also relying on users to enhance security necessary degrades the usability. In order to enhance security as well as usability here we use RSA algorithm which avoid some problems in e-banking such as session hijacking , monitoring using video sensor etc. By providing unique key to the users after scanning the QR code available in screen. According to the unique key,the user will be given a specific 4*4 matrix keyboard in user’s smart phone which reposition the keys every time inorder to avoid hacking. To that end, there are two visual authentication protocols: one is a one-time-password protocol, and the other is a password-based authentication protocol. Through rigorous analysis, we verify that our protocols are immune to many of the challenging authentication attacks applicable in the literature.

Authors and Affiliations

R. Sangeetha , N. HarshaVinodha , A. V. Kalpana

Keywords

Related Articles

 ACTIVITY BASED COSTING-A TOOL TO CONTROL THE COST

 Activity-based costing (ABC) is a costing methodology that identifies activities in an organization and assigns the cost of each activity with resources to all products and services according to the actual consump...

 HAMILTONIAN LACEABILITY IN MIDDLE GRAPHS

 This paper is aimed to discuss Hamiltonian laceability in the context of the Middle graph of a graph. We explore laceability properties of the Middle graph of the Gear graph, Fan graph, Wheel graph, Path and Cycle...

ELECTRICAL ENERGY CONSERVATION IN A DISTILLERY PLANT- A CASE STUDY

Energy is a main function for each kind of process. It is the central force behind our productivity, our leisure and our environment. Energy Audit is the integral part of Energy Management. The energy audit can unearth h...

 Fingerprint and GSM based Security System

 The main purpose of this paper is to design and implement high security system. Security is a prime concern in our day-to-day life. Perhaps the most important application of accurate personal identification is s...

 Intrinsic Plagiarism Detection for Text Based Features Pattern

 Plagiarism detection means detecting the document whether copied or stealing from the other document. The main goal is to detect the word by analyzing the writing style using technique intrinsic plagiarism detecti...

Download PDF file
  • EP ID EP116780
  • DOI -
  • Views 109
  • Downloads 0

How To Cite

R. Sangeetha, N. HarshaVinodha, A. V. Kalpana (2015).  QR CODE BASED ENCRYPTED MATRIX REPRESENTATION FOR ERADICATING HARDWARE AND SOFTWARE KEYLOGGING. International Journal of Engineering Sciences & Research Technology, 4(4), 642-647. https://europub.co.uk/articles/-A-116780