Secured authentication using CAPTCHA and visualized passcode
نویسندگان
چکیده
منابع مشابه
Secured Electronic Voting Protocol Using Biometric Authentication
This paper proposes a new secure e-voting protocol. This new scheme does not require a special voting channel and communication can occur entirely over the existing Internet. This method integrates Internet convenience and cryptology. In the existing protocols either the tallier has to wait for the decryption key from voter till the voting process is over or the verification process has to wait...
متن کاملSecured Bluetooth Authentication Using Artificial Neural Networks
Authentication in wireless networking is a mechanism to proof identities and avoid masking. The use of wireless devices and technology has made rapid growth in the market. In all such devices, user authentication is done once and is considered authentic forever until it is revoked by the user. We present a model of authentication, where a Bluetooth enabled mobile phone and laptop is taken. In t...
متن کاملSecured Authentication Protocol System Using Images
In order to protect secret information from sensitive and various applications, secured authentication system should be incorporated; it should contain security and confidentiality. Even if it is assumed that the cryptographic primitives are perfect, the security goals may not be achieved: the system itself may have weaknesses that can be exploited by an attacker in network attacks. In this pap...
متن کاملGraphical Password Using Captcha for More Secure Authentication Scheme
388 ISSN: 2278 – 1323 All Rights Reserved © 2015 IJARCET Abstract: A new security primitive for new graphical authentication scheme based on hard artificial intelligence problems. Number of graphical password scheme has been proposed as options to traditional to text password authentication, namely a new family of graphical password system for Captcha technology with the level of security. We...
متن کاملSecured Biometric Authentication using Visual Cryptography and Transforms
Protection of biometric data is gaining importance because its uniqueness and digital watermarking techniques are used to protect the biometric data from either accidental or intentional attacks. Here introduces a novel secured authentication method using wavelet decomposition and Visual Cryptography to hide an iris image. In this report gives exhaustive study on a scheme in which iris image is...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering & Technology
سال: 2018
ISSN: 2227-524X
DOI: 10.14419/ijet.v7i1.8.9973