Securing Web Accounts Using Graphical Password Authentication through Watermarking
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 6
Abstract
Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user-friendly password-based method has been on the agenda of security researchers for a long time. On one hand, there are password manager programs which facilitate generating site-specific strong passwords from a single user password to eliminate the memory burden due to multiple passwords. On the other hand, there are studies exploring the viability of graphical passwords as a more secure and user-friendly alternative. In this project, we propose a new graphical password scheme for accessing web accounts called “Secure Web Account Access through Recognition Based Graphical Password by Watermarking”. Here user selects number of images as a password and while login user needs to enter the random code generated below each image, which has been set as a password. Here the security of the system is very high and every time user needs to enter different set of code for authentication i.e. every time new password gets generated making Dictionary attacks, Brute Force attack, and other attacks infeasible.
Authors and Affiliations
Vinit Khetani , Jennifer Nicholas , Anuja Bongirwar , Abhay Yeole
An Approach for Normalizing Fuzzy Relational Databases Based on Join Dependency
Fuzziness in databases is used to denote uncertain or incomplete data. Relational Databases stress on the nature of the data to be certain. This certainty based data is used as the basis of the normalization approach des...
A Survey of Preprocessing Method for Web Usage Mining Process
The amount of web applications are increasing in large amount and users of web applications are also increasing rapidly with high speed. By increasing number of users the size of log file also increases .The information...
Secure and Faster NN Queries on Outsourced Metric Data Assets
Cloud computing enables outsourcing of data in pay per use fashion. This will help data owners to have services of storage without the need for investment. However, they have security concerns as the cloud service provid...
Novel Sensing Approach for Predicting SLA Violations
Customer contentment plays a vital role in business environment. Service level agreements (SLA’s) are signed between the service provider and the customer where SLA violation acts as a major constraint. SLA Violation is...
A Survey on Mobility Management Protocols for Improving Handover Performance
The wireless and mobile communication systems have enormous growth in recent years because many people use mobile devices for acquiring different services like browsing, multimedia applications and file sharing etc. Mobi...