SlideShare a Scribd company logo
1 of 3
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 130
MULTILEVEL AUTHENTICATION USING GPS AND OTP TECHNIQUES
Priyanka R. Tope1
, Pranali R. Raut2
, Swamini B. Dalvi3
, Archana C. Lomte4
1, 2, 3
Student, 4
Assistant Professor, Department of Computer, BSIOTR (W), Maharashtra, India
Abstract
Location based authentication is a new direction in development of authentication techniques in the area of security. In this paper, the
geographical position of user is an important attribute for authentication of user. It provides strong authentication as a location
characteristic can never be stolen or spoofed. As an effective and popular means for privacy protection data hiding in encrypted
image is proposed. In our application we are providing secure message passing facilities for this OTP (One Time Password) and
Steganoghaphy techniques are used. This technique is relatively new approach towards information security.
Keywords: Location based authentication, GPS device, Image encryption, Cryptography, Steganography, and OTP
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
Nowadays, in many papers main discussion is on user’s
location for authentication. Authentication is any process by
which a system verifies the identity of user who wishes access
it. It is normally based on identity of user such as user ID and
password. Authentication is one of the three main processes of
AAA systems (Authentication Authorization Accounting)[1].
Location based authentication is a latest technique for
providing higher security. It provides wireless technologies for
sending secure message. Using location based authentication
we find the user’s geographical position. For this we are using
three factors: Latitude, Longitude, and Altitude. Example of
location based authentication such as Corporate mail, military
area, banking etc.
Consider the example of any social networking site; the
important information about users such as user-name,
password, personal details, etc. is stored in the database. This
database is mostly placed on server which is located at
particular location. Access to this should be granted only when
the person is at geographic position where the particular server
is located. Location Based Authentication not only consider
user ID and password but also take geographical position; thus
leading to higher level security. After successful
authentication, the data that is to be sent and received would
be encrypted. To achieve this Advanced Encryption Standard
(AES) algorithm will be used.
1.1 Steganography
Steganography is the art and science of writing hidden
messages in such way that no one, apart from the sender and
intended recipient, suspects the existence of the message, a
form of security through obscurity.
As access to powerful computers increases, delivering
information with digital data becomes more convenient on the
internet. When these digital data are sensitive-whether text,
image or video-there is concern that the information
To enhance the security of information communication, the
digital data is embedded into other irrelevant products as
secret data. A method call steganography, popularly used with
internet communication [2], embeds secret data in a stego-
image that looks like a photograph. After the stego-image is
transmitted, the authorized receivers recover the secret data
using a spatial scheme, while attackers do not realize that the
stego-image hides secret information at all. The least
significant bits (LSBs) method is a well known steganographic
method. Wang et al. [3] proposed a substitution scheme using
LSBs that improved the stego-image’s quality.
1.2 One Time Password (OTP)
A One Time password (OTP) is a password that is valid for
only one login session or transaction. OTPs provides strong
authentication for remote access such as high level IT
resources, web service, mail server, online transaction. The
most important shortcoming that is addressed by OTPs is that,
the contrast to static password, they are not vulnerable to
replay attacks. On the down side, OTPs are difficult for human
beings to memorize.
2. SYSTEM ARCHITECTURE
This Software will work as a communication medium for the
members of an organization who wants to secure their data
transfer from being stolen. The tool is designed to work on a
network. The one who is going to use the software can work in
any environment condition provides all the tools required
executing the file. The machine on which the operation takes
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 131
place should have basic Windows Operating System (XP/2007
or higher).
In our application we are provides secure message passing
facilities:
1. Secure Authentication
2. Sending message of generated (OTP) password to user
mobile
3. Generation of strong key i.e. one time password
4. Encryption of secure data
5. Embedding in image (interested region)
6. Decryption of data
7. Message sending
Three level authentications is necessary for customer
1. Normal Login
2. OTP (One Time Password)
3. Location Based Login
Fig -1: System Architecture
3. ALGORITHM
In this paper we are using following algorithm:
3.1 AES (Advanced Encryption Standard):
AES algorithm is published in 2001[4]. In this algorithm block
length is limited to 128 bits and the key size is specified to
128, 192 or 256 bits.
Table -1: Key Size
Key size
(words/bytes/bits)
4/16/128 6/24/192 8/32/156
Number of rounds 10 12 14
Expanded key size
(words/byte)
44/176 52/208 60/240
AES Algorithm Steps:
• Substitute Bytes: Plain text will be written in matrix
format. For each byte a new byte will be substituted
and a new matrix will be formed.
• Shift Rows: First row is kept as it is. second row is
shifted left by one column and so on.
• Mix Columns: In mixed column, shift row matrix
will be multiply with another fixed polynomial
matrix to get mixed column matrix
• Add Round Key: Round key is added to the state
using x-or operation
3.2 ROI (Region of Interest):
This algorithm is used for steganography. For this ROI
algorithm is used and the data can be hidden in the region of
interest of the cover image.
ROI Steps:
• Input cover image
• Input text data
• Select ROI region
• Read input cover image
• Get bytes of text data
• Hide data into cover image using ROI
• Generate stego image as a output.
Fig -2: Image Steganography
4. IMPLEMENTATION
In this working phase user have to follow the three login steps
such as textual login, GPS login, and OTP login In first part,
when user perform normal login if it gets fail then user is not
valid but if it will get success then it goes to perform next type
of login i.e. GPS login. In this it get success then it follow the
next type of login is the OTP login. If OTP login gets success
then it perform the operation such as enter data for that we are
going use encryption and ROI steganography and encryption
of data will be takes place. At the server database decryption
of encrypted data will be takes place .Simultaneously GPS
parameter also check if the user is not in valid area then it is
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 132
not a valid user but if user in valid area then data will get
extracted from image then decryption of data will be takes
place and user get original data.
CONCLUSIONS
Location dependant authentication is an additional factor in
providing strong authentication. It gives owner the complete
control of the information that only he has access to. The
software will perform its functions properly only when the
user is within the authorized range. So the software will meet
the all security issues like confidentiality, integrity and so on.
Hence this application will be most suitable for military and
industrial data. The authentication techniques where
theoretically proposed till now.
REFERENCES
[1]. H.Rui, Y.Man, H.Janping, K.Zhigang, and M.Jain,” A
novel service-oriented AAA architecture,” in Personal,
Indoor and Mobile Radio Communications, 2003.
PIMRC 2003. 14th
IEEE Proceedings on, 2003, pp.
2833-2837 vol.3.
[2]. S. Zhen, L. Zhoujun, and D. Wenhua, “Different
approaches for the formal definition of authentication
property, ”in Communications, 2003. APCC 2003.The
9th
Asia-Pacific Conference Communications, 2003,
pp.854-858 Vol.2.
[3]. A. Menezes, P. Van Oorschot, ands. Vanstone.,
Handbook of Applied Cryptography: CRC Press.1997.
[4]. A simplified AES algorithm and its linear and
differential.
[5]. Jhon Justin M, Manimurugan S, “A Survey on Various
Encryption Techniques”, International Journal of Soft
Computing and Engineering(IJSCE)ISSN: 2231 2307,
vol-2, issue-1, March 2012.
[6]. E. Denning and P. F. MacDoran, ” Location-Based
authentication: Grounding cyberspace for better
security”,Computer Fraud and Security,
vol.1996,pp.12-16,1996.
[7]. P.S.Tikamdas and A.El Nahas, ”Direction-Based
proximity detection algorithm for location-based
services”,in Wireless and Optical Communications
Networks,2009. WOCN’09. IFIP International
Conference on,2009,pp.1-5.
[8]. B. Schilit , J. Hong, and M. Gruteser, “Wireless
Location privacy protection”, Computer, vol.36,pp.135-
137, dec 2003.
[9]. Moreland T, “Steganography and Steganalysis”,
Leiden Institute of Advanced Computing Science,
www.liacs.nl/home/tmoerl/privatech.pdf.
BIOGRAPHIES
Priyanka R. Tope, Department Of Computer,
BSIOTR (W), Pune, Maharashtra, India.
Email-id- tope.priyanka123@gmail.com
Pranali R. Raut, Department Of Computer,
BSIOTR (W), Pune, Maharashtra, India.
Email-id- pranaliraut77@gmail.com
Swamini B. Dalvi, Department Of Computer,
BSIOTR (W), Pune, Maharashtra, India.
Email-id- swamini.dalvi7@gmail.com
Prof. Archana C. Lomte, Department Of
Computer, BSIOTR (W), Pune, Maharashtra,
India. Email-id- archanalomte@gmail.com

More Related Content

What's hot

IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...IRJET Journal
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET Journal
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET Journal
 
IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?IRJET Journal
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...eSAT Publishing House
 
A survey on encryption algorithms for data security
A survey on encryption algorithms for data securityA survey on encryption algorithms for data security
A survey on encryption algorithms for data securityeSAT Journals
 
Color based android shuffling pattern lock
Color based android shuffling pattern lockColor based android shuffling pattern lock
Color based android shuffling pattern lockIRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemEditor IJCATR
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTPIRJET Journal
 
3.[10 13]location based spatial query processing in wireless system
3.[10 13]location based spatial query processing in wireless system3.[10 13]location based spatial query processing in wireless system
3.[10 13]location based spatial query processing in wireless systemAlexander Decker
 
11.location based spatial query processing in wireless system
11.location based spatial query processing in wireless system11.location based spatial query processing in wireless system
11.location based spatial query processing in wireless systemAlexander Decker
 
Secure3 authentication for sensitive data on cloud using textual, chessboard ...
Secure3 authentication for sensitive data on cloud using textual, chessboard ...Secure3 authentication for sensitive data on cloud using textual, chessboard ...
Secure3 authentication for sensitive data on cloud using textual, chessboard ...eSAT Journals
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR CodeIRJET Journal
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityEditor IJCATR
 
Securing Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationSecuring Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationApurva Kini
 
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICSENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICSIJNSA Journal
 

What's hot (20)

IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
 
A survey on encryption algorithms for data security
A survey on encryption algorithms for data securityA survey on encryption algorithms for data security
A survey on encryption algorithms for data security
 
Color based android shuffling pattern lock
Color based android shuffling pattern lockColor based android shuffling pattern lock
Color based android shuffling pattern lock
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
 
3.[10 13]location based spatial query processing in wireless system
3.[10 13]location based spatial query processing in wireless system3.[10 13]location based spatial query processing in wireless system
3.[10 13]location based spatial query processing in wireless system
 
11.location based spatial query processing in wireless system
11.location based spatial query processing in wireless system11.location based spatial query processing in wireless system
11.location based spatial query processing in wireless system
 
Secure3 authentication for sensitive data on cloud using textual, chessboard ...
Secure3 authentication for sensitive data on cloud using textual, chessboard ...Secure3 authentication for sensitive data on cloud using textual, chessboard ...
Secure3 authentication for sensitive data on cloud using textual, chessboard ...
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
 
Securing Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationSecuring Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint Authentication
 
Gs3612141219
Gs3612141219Gs3612141219
Gs3612141219
 
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICSENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
 

Viewers also liked

Mobile applications development by goigi
Mobile applications development by goigiMobile applications development by goigi
Mobile applications development by goigigoiginivedita
 
Non linear analysis of infilled frames
Non linear analysis of infilled framesNon linear analysis of infilled frames
Non linear analysis of infilled frameseSAT Publishing House
 
Atkinson et al 2015 Length-weight Emerald shiner
Atkinson et al 2015 Length-weight Emerald shinerAtkinson et al 2015 Length-weight Emerald shiner
Atkinson et al 2015 Length-weight Emerald shinerThomas Simon
 
HIPAA: Week 1 Discussion 2
HIPAA: Week 1 Discussion 2HIPAA: Week 1 Discussion 2
HIPAA: Week 1 Discussion 2Kelly Castle
 
problematica de las tic
problematica de las ticproblematica de las tic
problematica de las ticJohandres_c
 
Implementation of low power divider techniques using
Implementation of low power divider techniques usingImplementation of low power divider techniques using
Implementation of low power divider techniques usingeSAT Publishing House
 
Implementation of content based image retrieval using the cfsd algorithm
Implementation of content based image retrieval using the cfsd algorithmImplementation of content based image retrieval using the cfsd algorithm
Implementation of content based image retrieval using the cfsd algorithmeSAT Publishing House
 
Blog writing by goigi
Blog writing by goigiBlog writing by goigi
Blog writing by goigigoiginivedita
 
A survey on energy efficient with task consolidation in the virtualized cloud...
A survey on energy efficient with task consolidation in the virtualized cloud...A survey on energy efficient with task consolidation in the virtualized cloud...
A survey on energy efficient with task consolidation in the virtualized cloud...eSAT Publishing House
 
Seo content writing by goigi
Seo content writing by goigiSeo content writing by goigi
Seo content writing by goigigoiginivedita
 
Tugas%20etika%20 kampanye%20politik%20dan%20kode%20etik%20penyiaran
Tugas%20etika%20 kampanye%20politik%20dan%20kode%20etik%20penyiaranTugas%20etika%20 kampanye%20politik%20dan%20kode%20etik%20penyiaran
Tugas%20etika%20 kampanye%20politik%20dan%20kode%20etik%20penyiaranAnnisaa Widyasari
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniqueseSAT Publishing House
 
The measurement model for outsourcing worker
The measurement model for outsourcing workerThe measurement model for outsourcing worker
The measurement model for outsourcing workereSAT Publishing House
 
أجرك صوت الدراهم
أجرك صوت الدراهمأجرك صوت الدراهم
أجرك صوت الدراهمSami Guiba
 

Viewers also liked (20)

Mobile applications development by goigi
Mobile applications development by goigiMobile applications development by goigi
Mobile applications development by goigi
 
Non linear analysis of infilled frames
Non linear analysis of infilled framesNon linear analysis of infilled frames
Non linear analysis of infilled frames
 
Model rapor smk
Model rapor smkModel rapor smk
Model rapor smk
 
Web design by goigi
Web design by goigiWeb design by goigi
Web design by goigi
 
Atkinson et al 2015 Length-weight Emerald shiner
Atkinson et al 2015 Length-weight Emerald shinerAtkinson et al 2015 Length-weight Emerald shiner
Atkinson et al 2015 Length-weight Emerald shiner
 
HIPAA: Week 1 Discussion 2
HIPAA: Week 1 Discussion 2HIPAA: Week 1 Discussion 2
HIPAA: Week 1 Discussion 2
 
problematica de las tic
problematica de las ticproblematica de las tic
problematica de las tic
 
Proof of payment
Proof of paymentProof of payment
Proof of payment
 
Implementation of low power divider techniques using
Implementation of low power divider techniques usingImplementation of low power divider techniques using
Implementation of low power divider techniques using
 
Implementation of content based image retrieval using the cfsd algorithm
Implementation of content based image retrieval using the cfsd algorithmImplementation of content based image retrieval using the cfsd algorithm
Implementation of content based image retrieval using the cfsd algorithm
 
Blog writing by goigi
Blog writing by goigiBlog writing by goigi
Blog writing by goigi
 
Catalogo final
Catalogo finalCatalogo final
Catalogo final
 
A survey on energy efficient with task consolidation in the virtualized cloud...
A survey on energy efficient with task consolidation in the virtualized cloud...A survey on energy efficient with task consolidation in the virtualized cloud...
A survey on energy efficient with task consolidation in the virtualized cloud...
 
Seo content writing by goigi
Seo content writing by goigiSeo content writing by goigi
Seo content writing by goigi
 
Tugas%20etika%20 kampanye%20politik%20dan%20kode%20etik%20penyiaran
Tugas%20etika%20 kampanye%20politik%20dan%20kode%20etik%20penyiaranTugas%20etika%20 kampanye%20politik%20dan%20kode%20etik%20penyiaran
Tugas%20etika%20 kampanye%20politik%20dan%20kode%20etik%20penyiaran
 
Untitled haiku-deck
Untitled haiku-deckUntitled haiku-deck
Untitled haiku-deck
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniques
 
The measurement model for outsourcing worker
The measurement model for outsourcing workerThe measurement model for outsourcing worker
The measurement model for outsourcing worker
 
أجرك صوت الدراهم
أجرك صوت الدراهمأجرك صوت الدراهم
أجرك صوت الدراهم
 
Montesa cota
Montesa cotaMontesa cota
Montesa cota
 

Similar to Multilevel authentication using gps and otp techniques

Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voiceeSAT Publishing House
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureeSAT Journals
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET Journal
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different mediaseSAT Publishing House
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different mediaseSAT Journals
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor AuthenticationIRJET Journal
 
False positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algoFalse positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algoeSAT Journals
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...eSAT Journals
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition systemeSAT Publishing House
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure AuthenticationIRJET Journal
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...Migrant Systems
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET Journal
 
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke DynamicsIRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke DynamicsIRJET Journal
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.IRJET Journal
 
A novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationA novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationeSAT Publishing House
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...eSAT Publishing House
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 

Similar to Multilevel authentication using gps and otp techniques (20)

Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
 
False positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algoFalse positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algo
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition system
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
 
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke DynamicsIRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke Dynamics
 
Paper2
Paper2Paper2
Paper2
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
 
A novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationA novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verification
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

The Satellite applications in telecommunication
The Satellite applications in telecommunicationThe Satellite applications in telecommunication
The Satellite applications in telecommunicationnovrain7111
 
input buffering in lexical analysis in CD
input buffering in lexical analysis in CDinput buffering in lexical analysis in CD
input buffering in lexical analysis in CDHeadOfDepartmentComp1
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labsamber724300
 
Substation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRHSubstation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRHbirinder2
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...arifengg7
 
1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptx1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptxMel Paras
 
AntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxAntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxLina Kadam
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
ADM100 Running Book for sap basis domain study
ADM100 Running Book for sap basis domain studyADM100 Running Book for sap basis domain study
ADM100 Running Book for sap basis domain studydhruvamdhruvil123
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSneha Padhiar
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionSneha Padhiar
 
Indian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdfIndian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdfalokitpathak01
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProRay Yuan Liu
 
Livre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdf
Livre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdfLivre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdf
Livre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdfsaad175691
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical trainingGladiatorsKasper
 
Submerged Combustion, Explosion Flame Combustion, Pulsating Combustion, and E...
Submerged Combustion, Explosion Flame Combustion, Pulsating Combustion, and E...Submerged Combustion, Explosion Flame Combustion, Pulsating Combustion, and E...
Submerged Combustion, Explosion Flame Combustion, Pulsating Combustion, and E...Ayisha586983
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 

Recently uploaded (20)

The Satellite applications in telecommunication
The Satellite applications in telecommunicationThe Satellite applications in telecommunication
The Satellite applications in telecommunication
 
input buffering in lexical analysis in CD
input buffering in lexical analysis in CDinput buffering in lexical analysis in CD
input buffering in lexical analysis in CD
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 
Substation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRHSubstation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRH
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
 
1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptx1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptx
 
AntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxAntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptx
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
ADM100 Running Book for sap basis domain study
ADM100 Running Book for sap basis domain studyADM100 Running Book for sap basis domain study
ADM100 Running Book for sap basis domain study
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
 
Indian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdfIndian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdf
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision Pro
 
Livre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdf
Livre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdfLivre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdf
Livre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdf
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training
 
Submerged Combustion, Explosion Flame Combustion, Pulsating Combustion, and E...
Submerged Combustion, Explosion Flame Combustion, Pulsating Combustion, and E...Submerged Combustion, Explosion Flame Combustion, Pulsating Combustion, and E...
Submerged Combustion, Explosion Flame Combustion, Pulsating Combustion, and E...
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 

Multilevel authentication using gps and otp techniques

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 130 MULTILEVEL AUTHENTICATION USING GPS AND OTP TECHNIQUES Priyanka R. Tope1 , Pranali R. Raut2 , Swamini B. Dalvi3 , Archana C. Lomte4 1, 2, 3 Student, 4 Assistant Professor, Department of Computer, BSIOTR (W), Maharashtra, India Abstract Location based authentication is a new direction in development of authentication techniques in the area of security. In this paper, the geographical position of user is an important attribute for authentication of user. It provides strong authentication as a location characteristic can never be stolen or spoofed. As an effective and popular means for privacy protection data hiding in encrypted image is proposed. In our application we are providing secure message passing facilities for this OTP (One Time Password) and Steganoghaphy techniques are used. This technique is relatively new approach towards information security. Keywords: Location based authentication, GPS device, Image encryption, Cryptography, Steganography, and OTP ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION Nowadays, in many papers main discussion is on user’s location for authentication. Authentication is any process by which a system verifies the identity of user who wishes access it. It is normally based on identity of user such as user ID and password. Authentication is one of the three main processes of AAA systems (Authentication Authorization Accounting)[1]. Location based authentication is a latest technique for providing higher security. It provides wireless technologies for sending secure message. Using location based authentication we find the user’s geographical position. For this we are using three factors: Latitude, Longitude, and Altitude. Example of location based authentication such as Corporate mail, military area, banking etc. Consider the example of any social networking site; the important information about users such as user-name, password, personal details, etc. is stored in the database. This database is mostly placed on server which is located at particular location. Access to this should be granted only when the person is at geographic position where the particular server is located. Location Based Authentication not only consider user ID and password but also take geographical position; thus leading to higher level security. After successful authentication, the data that is to be sent and received would be encrypted. To achieve this Advanced Encryption Standard (AES) algorithm will be used. 1.1 Steganography Steganography is the art and science of writing hidden messages in such way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. As access to powerful computers increases, delivering information with digital data becomes more convenient on the internet. When these digital data are sensitive-whether text, image or video-there is concern that the information To enhance the security of information communication, the digital data is embedded into other irrelevant products as secret data. A method call steganography, popularly used with internet communication [2], embeds secret data in a stego- image that looks like a photograph. After the stego-image is transmitted, the authorized receivers recover the secret data using a spatial scheme, while attackers do not realize that the stego-image hides secret information at all. The least significant bits (LSBs) method is a well known steganographic method. Wang et al. [3] proposed a substitution scheme using LSBs that improved the stego-image’s quality. 1.2 One Time Password (OTP) A One Time password (OTP) is a password that is valid for only one login session or transaction. OTPs provides strong authentication for remote access such as high level IT resources, web service, mail server, online transaction. The most important shortcoming that is addressed by OTPs is that, the contrast to static password, they are not vulnerable to replay attacks. On the down side, OTPs are difficult for human beings to memorize. 2. SYSTEM ARCHITECTURE This Software will work as a communication medium for the members of an organization who wants to secure their data transfer from being stolen. The tool is designed to work on a network. The one who is going to use the software can work in any environment condition provides all the tools required executing the file. The machine on which the operation takes
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 131 place should have basic Windows Operating System (XP/2007 or higher). In our application we are provides secure message passing facilities: 1. Secure Authentication 2. Sending message of generated (OTP) password to user mobile 3. Generation of strong key i.e. one time password 4. Encryption of secure data 5. Embedding in image (interested region) 6. Decryption of data 7. Message sending Three level authentications is necessary for customer 1. Normal Login 2. OTP (One Time Password) 3. Location Based Login Fig -1: System Architecture 3. ALGORITHM In this paper we are using following algorithm: 3.1 AES (Advanced Encryption Standard): AES algorithm is published in 2001[4]. In this algorithm block length is limited to 128 bits and the key size is specified to 128, 192 or 256 bits. Table -1: Key Size Key size (words/bytes/bits) 4/16/128 6/24/192 8/32/156 Number of rounds 10 12 14 Expanded key size (words/byte) 44/176 52/208 60/240 AES Algorithm Steps: • Substitute Bytes: Plain text will be written in matrix format. For each byte a new byte will be substituted and a new matrix will be formed. • Shift Rows: First row is kept as it is. second row is shifted left by one column and so on. • Mix Columns: In mixed column, shift row matrix will be multiply with another fixed polynomial matrix to get mixed column matrix • Add Round Key: Round key is added to the state using x-or operation 3.2 ROI (Region of Interest): This algorithm is used for steganography. For this ROI algorithm is used and the data can be hidden in the region of interest of the cover image. ROI Steps: • Input cover image • Input text data • Select ROI region • Read input cover image • Get bytes of text data • Hide data into cover image using ROI • Generate stego image as a output. Fig -2: Image Steganography 4. IMPLEMENTATION In this working phase user have to follow the three login steps such as textual login, GPS login, and OTP login In first part, when user perform normal login if it gets fail then user is not valid but if it will get success then it goes to perform next type of login i.e. GPS login. In this it get success then it follow the next type of login is the OTP login. If OTP login gets success then it perform the operation such as enter data for that we are going use encryption and ROI steganography and encryption of data will be takes place. At the server database decryption of encrypted data will be takes place .Simultaneously GPS parameter also check if the user is not in valid area then it is
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 132 not a valid user but if user in valid area then data will get extracted from image then decryption of data will be takes place and user get original data. CONCLUSIONS Location dependant authentication is an additional factor in providing strong authentication. It gives owner the complete control of the information that only he has access to. The software will perform its functions properly only when the user is within the authorized range. So the software will meet the all security issues like confidentiality, integrity and so on. Hence this application will be most suitable for military and industrial data. The authentication techniques where theoretically proposed till now. REFERENCES [1]. H.Rui, Y.Man, H.Janping, K.Zhigang, and M.Jain,” A novel service-oriented AAA architecture,” in Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 14th IEEE Proceedings on, 2003, pp. 2833-2837 vol.3. [2]. S. Zhen, L. Zhoujun, and D. Wenhua, “Different approaches for the formal definition of authentication property, ”in Communications, 2003. APCC 2003.The 9th Asia-Pacific Conference Communications, 2003, pp.854-858 Vol.2. [3]. A. Menezes, P. Van Oorschot, ands. Vanstone., Handbook of Applied Cryptography: CRC Press.1997. [4]. A simplified AES algorithm and its linear and differential. [5]. Jhon Justin M, Manimurugan S, “A Survey on Various Encryption Techniques”, International Journal of Soft Computing and Engineering(IJSCE)ISSN: 2231 2307, vol-2, issue-1, March 2012. [6]. E. Denning and P. F. MacDoran, ” Location-Based authentication: Grounding cyberspace for better security”,Computer Fraud and Security, vol.1996,pp.12-16,1996. [7]. P.S.Tikamdas and A.El Nahas, ”Direction-Based proximity detection algorithm for location-based services”,in Wireless and Optical Communications Networks,2009. WOCN’09. IFIP International Conference on,2009,pp.1-5. [8]. B. Schilit , J. Hong, and M. Gruteser, “Wireless Location privacy protection”, Computer, vol.36,pp.135- 137, dec 2003. [9]. Moreland T, “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/tmoerl/privatech.pdf. BIOGRAPHIES Priyanka R. Tope, Department Of Computer, BSIOTR (W), Pune, Maharashtra, India. Email-id- tope.priyanka123@gmail.com Pranali R. Raut, Department Of Computer, BSIOTR (W), Pune, Maharashtra, India. Email-id- pranaliraut77@gmail.com Swamini B. Dalvi, Department Of Computer, BSIOTR (W), Pune, Maharashtra, India. Email-id- swamini.dalvi7@gmail.com Prof. Archana C. Lomte, Department Of Computer, BSIOTR (W), Pune, Maharashtra, India. Email-id- archanalomte@gmail.com