A Review towards Enhancing Authentication Scheme Using Image Fusion and Multishared Cryptography

被引:0
|
作者
Gadicha, V. B. [1 ]
Alvi, A. S. [2 ]
机构
[1] PR Patil Coll Engg & Tech, Dept Comp Sci & Engn, Amravati, MH, India
[2] PRMlT&R, Dept Comp Sci & Engn, Amravati, MH, India
关键词
Visual Crypto Algorithm; Image Fusion; Two-Share Cryptography;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Passwords are used for user authentication, validation, and verification in various software applications ( may be Commercial, or Research based). All the existing schemes which are used to generate the password will always provide enough scope for the Intruder ( Cracker) to crack or guess the password. All the existing schemes of password generation works on a basic assumption that the resultant password should be easy to remember for a user. This ultimately brings the downfall of the scheme. Therefore, a Password Generator Scheme is proposed here which will restrict the Intruders to crack the password or a scheme should exist which will cause sufficient delay in cracking of a password so that the Generator of the password will change the previous password. Here a strong password generator scheme is proposed by using Image Fusion & Visual key Cryptography.
引用
收藏
页码:654 / 657
页数:4
相关论文
共 50 条
  • [1] An Image Based Authentication Technique Using Visual Cryptography Scheme
    Dais, Annie, V
    Joe, Vijesh C.
    Sugi, Sidney Swarna S.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 124 - 129
  • [2] CELLULAR AUTOMATA BASED IMAGE AUTHENTICATION SCHEME USING EXTENDED VISUAL CRYPTOGRAPHY
    Kukreja, Sonal
    Kasana, Geeta
    Kasana, Singara Singh
    [J]. COMPUTING AND INFORMATICS, 2019, 38 (06) : 1272 - 1300
  • [3] A REVIEW ON METHODS FOR IMAGE AUTHENTICATION AND VISUAL CRYPTOGRAPHY IN DIGITAL IMAGE WATERMARKING
    Vyas, Chinmay
    Lunagaria, Munindra
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 1191 - 1196
  • [4] A Secure Authentication Scheme in Adhoc Network Using Threshold Cryptography
    Priya, Lalita
    Chatterjee, Kakali
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATIONS TECHNOLOGIES (ICCCT 15), 2015, : 152 - 155
  • [5] A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography
    Chaudhry, Shehzad Ashraf
    Khan, Muhammad Tawab
    Khan, Muhammad Khurram
    Shon, Taeshik
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
  • [6] A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography
    Shehzad Ashraf Chaudhry
    Muhammad Tawab Khan
    Muhammad Khurram Khan
    Taeshik Shon
    [J]. Journal of Medical Systems, 2016, 40
  • [7] A Secure Access Authentication Scheme for Multiserver Environments using Neural Cryptography
    Pattanayak, Sayantica
    Ludwig, Simone A.
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2018, 13 (01): : 56 - 65
  • [8] An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography
    Chaudhry S.A.
    Naqvi H.
    Mahmood K.
    Ahmad H.F.
    Khan M.K.
    [J]. Wireless Personal Communications, 2017, 96 (04) : 5355 - 5373
  • [9] An Image Authentication Scheme Using Magic Square
    Chang, Chin-Chen
    The Duc Kieu
    Wang, Zhi-Hui
    Li, Ming-Chu
    [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 1 - +
  • [10] An image authentication scheme considering privacy - A first step towards surveillance camera authentication
    Kawaguchi, N
    Ueda, S
    Obata, N
    Shigeno, H
    Okada, K
    [J]. AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 253 - 256