Encoding Passwords using QR Image for Authentication

被引:0
|
作者
Istyaq, Salim [1 ]
Umar, Mohammad Sarosh [2 ]
机构
[1] AMU, Univ Polytech, Fac Engn & Technol, Comp Engn,EES, Aligarh, Uttar Pradesh, India
[2] AMU, Fac Engn & Technol, Dept Comp Engn, Aligarh, Uttar Pradesh, India
关键词
Matrix authentication; QR format; shoulder surfing; graphical authentication; encryption level;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Today, the world is moving beyond the imagination of the people, day by day new era in technology comes which create huge impact on their lives. As the invention of the computer takes place, now most of the work is performed with the help of computer. In order to protect the main resource of the people, it is important to make the modification in older technology or create a new one. Level of security such as textual password, biometric etc. are imposed. But there is some disadvantage i.e. textual password is easy to remember. On the other hand by using graphical approach, we can give the best alternative to the passwords as done in this paper. We presented a system based on the graphical scheme that uses QR code and the basic methodology is inside the levels of encryption in QR code. Our aim is to give the more complexity to the high yielding encryption in graphical passwords.
引用
收藏
页码:818 / 823
页数:6
相关论文
共 50 条
  • [41] Multiple color-image authentication system using HSI color space and QR decomposition in gyrator domains
    Abuturab, Muhammad Rafiq
    JOURNAL OF MODERN OPTICS, 2016, 63 (11) : 1035 - 1050
  • [42] Authentication and Transaction Verification Using QR Codes with a Mobile Device
    Chow, Yang-Wai
    Susilo, Willy
    Yang, Guomin
    Au, Man Ho
    Wang, Cong
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 437 - 451
  • [43] Prevention of Phishing Attacks Using QR Code Safe Authentication
    Teja, M. Taraka Rama Mokshagna
    Praveen, K.
    INVENTIVE COMPUTATION AND INFORMATION TECHNOLOGIES, ICICIT 2021, 2022, 336 : 361 - 372
  • [44] Matrix Passwords: A Proposed Methodology of Password Authentication
    Zhang, Xiao
    Clark, Jan
    AMCIS 2012 PROCEEDINGS, 2012,
  • [45] A Protocol of Quantum Authentication with Secure Quantum Passwords
    Hotta, Masahiro
    Ozawa, Masanao
    QUANTUM COMMUNICATION, MEASUREMENT AND COMPUTING (QCMC), 2009, 1110 : 388 - +
  • [46] PRINTED DOCUMENT AUTHENTICATION USING TWO LEVEL QR CODE
    Tkachenko, Iu.
    Puech, W.
    Strauss, O.
    Destruel, C.
    Gaudin, J. -M.
    2016 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING PROCEEDINGS, 2016, : 2149 - 2153
  • [47] Product Authentication Using Hash Chains and Printed QR Codes
    Keni, Harshith
    Earle, Montana
    Min, Manki
    2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 319 - 324
  • [48] The Authentication of Handwriting Signature by Using Motion Detection and QR Code
    Subpratatsavee, Puchong
    Pudtuan, Peerapon
    Charoensuk, Jirawan
    Sondee, Thanapob
    Vejchasetthanon, Thananchai
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA), 2014,
  • [49] QR Codes and Authentication Protection
    Yang, Jing
    Zhang, Yue
    2015 WIRELESS TELECOMMUNICATIONS SYMPOSIUM (WTS), 2015,
  • [50] User authentication via behavior based passwords
    Yampolskiy, Roman V.
    2007 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE, 2007, : 10 - +