Survey Paper onLive Object for Securing Graphical Password
Journal Title: International Journal of Emerging Technologies in Computational and Applied Sciences - Year 2018, Vol 23, Issue 1
Abstract
To provide more security to the cloud system, Live Object for a securing graphical password is a new graphical password scheme for public terminals that replaces the static digital images typically used in graphical password systems with personalized physical tokens, here in the form of digital pictures displayed on a physical user-owned device such as a mobile phone. Users represent these images to a system camera and then enter their password as a sequence of selections on live video of the token. Highly distinctive optical features are extracted from these selections and used as the password. We present three feasibility studies of Live Object for a securing graphical password examining its reliability, usability, and security against observation. The reliability study shows that image feature based passwords are viable and suggests appropriate system thresholds password items should contain a minimum of seven features, 40 percent of which must geometrically match originals stored on an authentication server in order to be judged equivalent. The usability study measures task completion times and error rates, revealing these to be 7.5 and 9 percent, broadly comparable with prior graphical password systems that use static digital images. The safety study highlights Live Object for a securing graphical password resistance to observation attack 3 attackers are unable to compromise a password using shoulder surfing, camera based observation, or malware. If everything will be fine then only the secure access to the cloud is granted.
Symbolic Pattern Analysis Method for PCB Defect Detection and Classification
According to recent advancements in manufacturing industries, Printed Circuit Boards and other components require depth inspection for better quality of product manufacturing. Electronic components are manufactured massi...
Design and Structural Analysis of Mast Member of Hydraulic RIG
Drilling rig is a machine that creates holes in the earth subsurface. Mast, a key part of hydraulic drilling rig, is a large steel structure with box section which loads all kinds of workforces. This paper focuses on the...
An Analysis and Survey on Multicast Routing Protocols for Mobile Ad hoc Networks
An ad hoc network is a dynamic wireless network with a set of cooperative nodes without a fixed infrastructure. Multicasting is used for group communication which supports the transmission of information from a sender to...
Bayesian Estimation of Minimum Uncertainties in Determining Parameters of Analytical Signal Consisting of Overlapping Symmetrical Peaks
We present the results of the error analysis of Bayesian estimates of peak parameters. The analysis was based on the sampling of the posterior distribution. Peak shape was modelled by Gaussian and Lorentzian functions .O...
EVOLUTIONARY STUDY OF X-LINKED GENES IN DROSOPHILA
To understand gene evolution in depth, studying evolution of both exon and intron in terms of their size, position, number and GC content is important. Till one and half decades, introns were considered as junk DNA and w...