THREE –WAY SECURITY USING IMAGE BASED AUTHENTICATION SYSTEM
نویسندگان
چکیده
منابع مشابه
Image authentication using LBP-based perceptual image hashing
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...
متن کاملimage authentication using lbp-based perceptual image hashing
feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of local binary pattern features. in this paper, we investigate the use of local binary patterns for percep...
متن کاملA Robust Three-Way Authentication System using Modified Random Grid based Reversible Style Visual Cryptography
The growing possibilities of modern communications require a special means of confidential and intellectual property protection against unauthorized access and use. Cryptography provides important tools for the protection of information and they are used in many aspects of computer security. This paper makes use of encrypted secret sharing to increases the security level of hidden data and to p...
متن کاملSecurity Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol
being developed using Scripting languages. PHP (ver. 5) and MySQL along with AJAX have been used extensively. Abstract:-Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along with being user friend...
متن کاملAn Image Based Approach for Authentication Using Multi-level Security System
-Security-sensitive environments defend their resources against unauthorized access by implementing access management mechanisms. Text based passwords are not secure enough for such applications. Increasing security has regularly been a problem since net and net Development came into existence, text primarily based passwords is not enough to counter such problems, that's to boot Associate in Nu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer and Communication Technology
سال: 2016
ISSN: 2231-0371,0975-7449
DOI: 10.47893/ijcct.2016.1335