Soumettre la recherche
Mettre en ligne
IRJET- Security Empowerment using QR Code and Session Tracking for Cued Recall based Textual Password Users
•
0 j'aime
•
24 vues
IRJET Journal
Suivre
https://www.irjet.net/archives/V5/i3/IRJET-V5I3532.pdf
Lire moins
Lire la suite
Ingénierie
Signaler
Partager
Signaler
Partager
1 sur 5
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET Journal
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
IJCERT
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
IJERA Editor
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key Order
IRJET Journal
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
Susmitha Reddy
IRJET - Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
IRJET Journal
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
IOSR Journals
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET Journal
Recommandé
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET Journal
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
IJCERT
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
IJERA Editor
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key Order
IRJET Journal
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
Susmitha Reddy
IRJET - Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
IRJET Journal
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
IOSR Journals
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET Journal
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
IRJET Journal
IRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET Journal
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET Journal
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET Journal
Honeywords for Password Security and Management
Honeywords for Password Security and Management
IRJET Journal
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
IJMER
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Nexgen Technology
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET Journal
Adapting singlet login in distributed systems
Adapting singlet login in distributed systems
eSAT Publishing House
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET Journal
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
IRJET Journal
IRJET- Internal Security in Metropolitan Area Network using Kerberos
IRJET- Internal Security in Metropolitan Area Network using Kerberos
IRJET Journal
Iaetsd confidential multiparty computation with
Iaetsd confidential multiparty computation with
Iaetsd Iaetsd
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
Pvrtechnologies Nellore
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
IJERA Editor
Adapting singlet login in distributed systems
Adapting singlet login in distributed systems
eSAT Journals
SQl Injection Protector for Authentication in Distributed Applications
SQl Injection Protector for Authentication in Distributed Applications
IOSR Journals
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET Journal
ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATA
ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATA
IJCSEIT Journal
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
IJNSA Journal
QR Code Document Authentication and Retrieval
QR Code Document Authentication and Retrieval
IRJET Journal
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
Contenu connexe
Tendances
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
IRJET Journal
IRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET Journal
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET Journal
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET Journal
Honeywords for Password Security and Management
Honeywords for Password Security and Management
IRJET Journal
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
IJMER
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Nexgen Technology
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET Journal
Adapting singlet login in distributed systems
Adapting singlet login in distributed systems
eSAT Publishing House
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET Journal
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
IRJET Journal
IRJET- Internal Security in Metropolitan Area Network using Kerberos
IRJET- Internal Security in Metropolitan Area Network using Kerberos
IRJET Journal
Iaetsd confidential multiparty computation with
Iaetsd confidential multiparty computation with
Iaetsd Iaetsd
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
Pvrtechnologies Nellore
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
IJERA Editor
Adapting singlet login in distributed systems
Adapting singlet login in distributed systems
eSAT Journals
SQl Injection Protector for Authentication in Distributed Applications
SQl Injection Protector for Authentication in Distributed Applications
IOSR Journals
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET Journal
ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATA
ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATA
IJCSEIT Journal
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
IJNSA Journal
Tendances
(20)
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
IRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
Honeywords for Password Security and Management
Honeywords for Password Security and Management
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
Adapting singlet login in distributed systems
Adapting singlet login in distributed systems
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
IRJET- Internal Security in Metropolitan Area Network using Kerberos
IRJET- Internal Security in Metropolitan Area Network using Kerberos
Iaetsd confidential multiparty computation with
Iaetsd confidential multiparty computation with
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Adapting singlet login in distributed systems
Adapting singlet login in distributed systems
SQl Injection Protector for Authentication in Distributed Applications
SQl Injection Protector for Authentication in Distributed Applications
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATA
ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATA
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
Similaire à IRJET- Security Empowerment using QR Code and Session Tracking for Cued Recall based Textual Password Users
QR Code Document Authentication and Retrieval
QR Code Document Authentication and Retrieval
IRJET Journal
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
IRJET Journal
IRJET- Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
IRJET Journal
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
IRJET Journal
Irjet v7 i3570
Irjet v7 i3570
aissmsblogs
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
IRJET Journal
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
A Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private Information
IRJET Journal
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET Journal
Enhancing Password Manager Chrome Extension through Multi Authentication and ...
Enhancing Password Manager Chrome Extension through Multi Authentication and ...
ijtsrd
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET Journal
IRJET - Three Layered Security for Banking
IRJET - Three Layered Security for Banking
IRJET Journal
Fake Product Identification using Blockchain Technology
Fake Product Identification using Blockchain Technology
IRJET Journal
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
IRJET Journal
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
E voting authentication with qr-codes
E voting authentication with qr-codes
Md. Hasibur Rashid
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET Journal
Similaire à IRJET- Security Empowerment using QR Code and Session Tracking for Cued Recall based Textual Password Users
(20)
QR Code Document Authentication and Retrieval
QR Code Document Authentication and Retrieval
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
IRJET- Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
Irjet v7 i3570
Irjet v7 i3570
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
A Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private Information
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
Enhancing Password Manager Chrome Extension through Multi Authentication and ...
Enhancing Password Manager Chrome Extension through Multi Authentication and ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET - Three Layered Security for Banking
IRJET - Three Layered Security for Banking
Fake Product Identification using Blockchain Technology
Fake Product Identification using Blockchain Technology
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
E voting authentication with qr-codes
E voting authentication with qr-codes
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
Plus de IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Plus de IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Dernier
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
sivaprakash250
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
Prabhanshu Chaturvedi
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
SIVASHANKAR N
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
sanyuktamishra911
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Call Girls in Nagpur High Profile
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
result management system report for college project
result management system report for college project
Tonystark477637
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
simmis5
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
roncy bisnoi
Dernier
(20)
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
result management system report for college project
result management system report for college project
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued Recall based Textual Password Users
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2325 Security Empowerment Using QR Code and Session Tracking For Cued Recall Based Textual Password Users Megha Rajagopal1 1PG Scholar, Department of Computer Science and Engineering, Nehru College of Engineering and Research Centre, Thiruvilamala, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Now-a-days, web authentication becomes more vulnerable to attacks. During Login many of us forget to remember the password. To recall the password we have used Cued recall based textual passwords. By generating hints or cues based on Contact list details user can easily map that hints to passwords. For each registrationuserinformationand related password hash values are stored in the database. In this paper, proposed the concept to secure the database from attacks. Details of registered user information’s which are stored in the database are extracted and convertedtoQRcode. Also Introduced a Java based QR Code generator for making Contact , SMS, URL, TEXT ,Phone number details to QR Code for better communication purpose through web and User Sessions are protected by using Session Tracking Technique. Keywords: Authentication CuedRecall,QRCode,QRCode Generator, Session Tracking 1. INTRODUCTION A password hint generation scheme which makes use of a user’s contacts list, which constitutes an available and familiar information source to the user, to automatically generate an on the- fly, easy-to-remember password hint that is learned upon the first login To use this technique, a user has to mentally associate contact names from his/her contact list with the correct passwords. Hints will be instantly generates from the contact list, which helps to trigger the memory of the user to remember the password .During signup, user will enter the password, for that password, salt value will be generated then attached and shows to the user to enter for the first time. After entering the password with salt value, Hash code will be generated for the password with salt value, and hash code will get stored in the database. Salt value will be extractedandstores it in the System Drive. For login in to the applicationuserhas to enter the password without salt value. Salt value will be extracted from the System Drive and concatenate with the password, Hash code will be generated for the same. If stored hash code matches Login successful. Else Hash code mismatched, compare the matching word tothepasswordin the contact list, and display the hints with respective to that. If user unable to remember the password, even after the hints, it will display invalid password. Hint generation is based on SYNTHIMA algorithm for reducing no of invalid login attempts and then thereby Improving memory recall.SYNTHIMA will maintain a copy of contact list. Password Salting Function and Cryptographic onewayHash function is the main concepts used in algorithm. Through Modulo Operation convert the resulting hash values to smaller values that fit the contact list size.Contactlist operations such as Insertion,Updation ,Deletion has to be performed ,and there by working of algorithm related to Operations will generate hints. 2. PRIOR WORK 2.1 Two Level QR Code (2LQR) Pallavi Tekade [1], Proposed 2LQR contains two security levels mainly called as public level and private level. This layered design provides privacy and security during personal message sharing and document authentication. Publicly showed information are stored in Public level. The secret and private information are storedinthePrivatelevel. By using any standard QR scanner, only public information’s will be shown. Here tried three different types of characterization patterns: mean patterns, median patterns for the private message sharing process and original patterns for the document authentication process.Themean and median characterization patterns will give approximately the same results of pattern detection. The best pattern recognition results were obtained, while using original patterns as characterization patterns. During Standard QR Code generation by encoding public message there exists a pre-defined library Zxing which has to be imported for making Standard QR code scanning more easily. Reed Solomon’s algorithm is used for generating Private QR Code. For 2LQR code creation 2 steps has to be performed. The first one is Pattern generation and second is Replacement of black modules with generated patterns of the Standard QR code. Here creates patterns for all the alphanumeric charactersalong with the specialsymbolsand those patterns are stored in the database. Both QR Code generation and Cryptography algorithms are used. 2.2 Fast QR Code Detection Xiang Zhang [2] ,Proposed The Two Algorithms Zbar and Zxing algorithm are open source bar codes and QR code detection algorithms. Zbar is an open source software suit which helps to read bar codes from various sources, such as video streams, image files and raw intensity sensors. The layered implementation facilitates bar code scanning and decoding for any application. Zxing is an open source, multi- format 1D or 2D barcode image processing library implemented in Java that contains ports that are connected to other languages. Zbar and Zxing methodsachievethehigh detection rate. A two-stage component-based detection concept has been proposed.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2326 2.3 Web Tracking: Mechanisms, Implications Tomasz Bujlow [3],Defines For User Tracking Purpose Mainly five main groupsof methods have been used,thatare based on sessions, client storage, client cache,fingerprinting, and other approaches. A special focus is placed on mechanisms that use web caches, operational caches, and fingerprinting, as they are usually very rich in termsofusing various creative methodologies. Identification of Users on the web and connecting with their real names, e-mail addresses, phone numbers, are detailed. Here shows why tracking is being used and its possible implications for each users. For each of the tracking methods, possible defenses are also mentioned. Finally, Detailing abouttheusertracking future trends and show that they can potentially Control significant threats to the users' privacy. The user is familiarized with different tracking mechanisms while browsing the web on a regular basis. He orsheknowshowto properly use simple means of protectionasprivatebrowsing mode or Ad Block like browser addons will decreases privacy threats. 2.4 Proxy Re-Encryption K.Lakshmi [4] Proposed In barcodes, machine readable Information’s are encoded ,a human can’t differentiate whether it’s a valid or a maliciously manipulated code. While humans might Undergo for phishing attacks, automated readers likely vulnerable to SQL injections and command injections. In this approach both encoding rate and interference level will be optimized with two robust error correction methods. Existing systemsuses techniques like Steganography, DCT, DFT and Secret (N, N)-Threshold QR Code Sharing Approach. But in proposed system convolution coder is has been used for encoding the QR Code at the transmitted side and decode the same at the receiver side. 2.5 Strength of QR Code Lokesh S.[4],Proposed a new system for image based authentication, where the image is represented as identification of authenticated user. Storing unique id or password into image which helps to restrict unauthorized user access. This proposed algorithm is help to remove the weakness of password authentication and bypass the risk generated from password authentication. Here algorithm takes input string as user name and it is directed to binary search algorithm for availability or unique user name. User enter password as tier1 identification. Using DESencryption technique Encrypting the password string and there by passing to Selective algorithm for generating QRcodeimage. By applying Reed Solomon code or error correcting technique data can be recovered even if part of the printed symbol has been destroyed and Decoding process also explained in detail and security issue with QR code image has been examined. 2.6 A Desktop Application of QR Code Partiksha Mittra [6],Proposed technique Contains two modules QR code generator and QR code reader. the user will be able to generate a QR code using text and image. QR code base on text and the other one is QR code based image ,by entering the Image Location.User can encrypt the QR code by setting Password. Once the password is entered,the encrypted QR code will be generated accordingly. Once a QR code is generated, it will be displayed on the screen as well as saved as an image file at a specific destination folder/directory within the hard drive of the user PC. After the QR code is generated, the user will be able to scan it through the “Scan” option present in our field that will become visible below the generated QR code. 2.7 QR Code Steganography Pei-Yu Lin [7],Proposed In this article, explored the characteristic of QR barcode and design a QR barcode steganography mechanism. The private information can be embedded into a cover QR tag with high secret payload. In case of a normal scanner, from the marked QR code a browser reveal the cover QR content. Only the authorized user/scanner can reveal the private secret informationfrom the marked QR tag. Based on the Result, the new algorithm can convey a better secret payload in to a QR tag. This is efficient and feasible for private QR applications. To protect the confidential secret of QR tag and barcode reader directly decoded it. 2.8 Signing In Using Quick Response Codes Kalpesh Adhatrao [8],Proposed the emerging threatstouser privacy over the internet are increasing at an alarming rate. Signing in from an unreliable terminal into a web account may result in compromising private details of a user such as username and password, by means of keylogger software. A login method is used for signing in Using Quick Response (QR) codesvia mobile authentication. Through this method, the user can securely sign-in into a web account by authenticating the user session on an terminalbrowser,with a mobile device. Also proposed a new login system, which strengthens the virtual privacy of a each user. The objective is to provide a reliable login technique for the user, operating based on an unreliable terminal, such as one in a cyber cafe. By shoulder surfing, an attacker can retrieve only the characters that are entered via keyboard and the authentication system takes an asymmetric key technique, even if an unauthorized person gets access to the QR code and scans it to grant access to the mobile website and the public key, but the private key will be still safe at the user session on the terminal web browser operated by the user himself. Thus users of this system are safe from shoulder surfing attacks. As one can notice, this system is also secure from screen-capturing, mouse and eye tracking software.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2327 3. METHODOLOGY Actually SYNTHIMA doesn’t store any user credentials in database or file while developing on androidapplication.But In case of SYNTHIMA as web application the User Information’s ,Hash values and secret key ,copy of Contact list etc are stored in the database for maintaining the copyof data.. This Paper Focus on Improving Security Feature of SYNTHIMA Database and also the Session Tracking of each user in Web application. 3.1 QR Codes A QR (“Quick Response") code is a two dimensional barcode invented by Denso Wave. Information is encoded in boththe vertical and horizontal direction, main highlight is holding up to several hundred timesmore data than a traditionalbar code Data is accessed by capturing a photograph of the code using a camera and processing the image with a QR reader. Characteristics of QR CODES: High capacity encoding of data Small printout size Kanji and kana capability Capacity of restoring and error correction The four layers of error correction of QR Code represented as L, M, Q and H in increasing order of capacity as follow. 1. Level L is approximately 7% 2. Level M is approximately 15% 3. Level Q is approximately 25% 4. Level H is approximately 30% In relation with the layers of error correction, the capacityof Level L denotes the weakness one, the capacity of level H is the stronger one Readable from any direction in 360 degrees Structured appending Feature 3.2 Module Specification 1) Extracting Registered User Information from database and Conversion to QR Code 2) Development of Java based QR Generator. 3) Send QR Image as MMS or Email 4) User Session Tracking Technique Implemented A) Extracting Registered User Information From Database and Conversion to QR Code Mainly the database contains User Information’s Includes email, phone no etc, Hash values and Security Keys of each registered user based on User Id data’s are extracted from database and Convert in to QR Code and can be Stored in the system. Fig -1: Generation and Scanning of QR Codes in Detail Fig -1 gives a simplified description of the standard process of generating a QR code from a provided message and scanning the code with a smart phone or a comparable device. When provided a message string, the encoder converts the message into a byte string interleaved with general QR header information, error correctionbytes,anda masking element. This modified bytestringisthenconverted to a 2-dimensional matrix of 1’s (white) and zeroes (black) which can be synthesized into an image. When this image is scanned by a phone camera, the byte string is retrieved and converted to the intended message, viewable by the person who initiated the scan. B) Development of Java based QR Code Generator. Developing a java based QR Code generator helps to make QR Code easily for secured data storing. QR Code Generator contains sections such as Contacts, SMS, URL, Text, Phone number C) Send QR Image as MMS or Email Sending QR Images including user information has to be send over through web If there is any Updation in Contact list Allocated hints may vary. So notyfing user through Msg or Email by encoded with QR Code New Vcard Can be generated for sending new contact information Alternatevely,new Vcard can be generate and store to database D) Session Tracking Technique Session Tracking Techniqueshelpsto know about each user Session information’s such as Username, User Id, Creation Time, Time of Last Access, No of Previous Session etc. Then by can assure that no unauthorized access has takes place. Session tracking helps a user to track a user's work status over multiple servlets or on HTML pages. A session is stated as a series of related browser requests that produces from
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2328 the same client within a certain period of time. Session tracking knots a series of browser requests that may have some meaning. HTTP is a “stateless” protocol: each time a client retrieves a Web page, the client access a separate connection to the Web server and the server does not automatically maintain major informationabouttheclient.A session is linked with a specified client. When the session is created on the server, it is associated with a personal ID.The browser must provide this session ID with its request in order for the server to find the session data again.Theserver tries to store this ID using: Cookies and Hidden Form Field. 3.4 System Architecture Registered user will insert query to database which results in extracting user information including hash value and Security key of Synthima process and ConvertingtoQRCode which helps to increase the security of database and user information. Java Swing application helps to retrieve data user wanted data in the form of QR code. Forcommunication with users these generated QR Codes are used. While processing SYNTHIMA, the changes such as updation ,deletion of Contact list information or hint changes will be notified to users. Sessions of each Registered Users are tracked. Fig -2: System Architecture 4. RESULTS AND DISCUSSION Based on the computation of the Web application using Synthima technique, User information on database are not secured. Therefore by implementing QR Code the security features are increased ,Only Registered users can access the the data embedded QR Codes and get notification based on Synthima Process Operations like Updation, DeletionofUser Information.Communuication process through QR Code Provide much more Security than before. Tracking user Sessions is also added in order to monitor the usage time of each Authorized User and there by reduce attack chance According to the evaluation of the processofwebapplication Table-1 shows the performance and attack rate without QR code enhancement, whereas Table-2 shows the attack and performance rate with the inclusion of QR code. Finally observed that there isslight variance in the rates withbetter performance. Table -1: SYNTHIMA DATABASE WITHOUT QR CODE Property Total No. of Attempts No. of Attempts Succeeded Result (in%) Chance of Attacks 40 28 70% No of Data Retrieval 40 22 55% Table -2: SYNTHIMA DATABASE WITH QR CODE Property Total No. of Attempts No. of Attempts Succeeded Result (in%) Chance of Attacks 40 15 37.5% No of Data Retrieval 40 10 25% 5. CONCLUSION In this Paper, Proposed the Concept of Securing Synthima Database by extracting the user information and convert in to QR code. Then developed Java based QR Code generator for Creating QR code of Contact ,SMS,URL,TEXT ,Phone number for better communicationpurpose throughweband User Sessions are protected by using Session Tracking Technique REFERENCES [1] Pallavi Tekade1, Anub Vamadevan, “Implementation of Two Level QR Code (2LQR),” International Journal of Advanced Research in Computer and Communication Engineering, ISO 3297:2007 Certified, Vol. 6, Issue 4, April 2017 [2] Xiang Zhang, Hangzai Luo, “Fast QR Code Detection,” 978-1-5386-3148-5/17/$31.00 © 2017 IEEE [3] Tomasz Bujlow, ValentÍn ,” A Survey on Web Tracking: Mechanisms, Implications, and Defenses”, Proceedings of the IEEE ( Volume: 105, Issue: 8, Aug.2017 ) [4] K.Lakshmi, D.Jeyamanilatha, “QR Code Security Using Proxy Re-Encryption for Private Data SharedBarcodes,” International Journal of Electronics & Communication Technology, IJECT Vol. 8, Issue 1, Jan - March 2017
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2329 [5] Lokesh S. Khedekar Prajakta S. Kale,” Strength of QR Code over Design and ImplementationofAuthentication System”, International Conference on Communication and Signal Processing, April 6-8, 2016, India 978-1- 5090-0396-9/16/$31.00 ©2016 IEEE [6] Partiksha Mittra, Nitin Rakesh,”A DesktopApplicationof QR Code for Data Security and Authentication”, Inventive Computation Technologies (ICICT), International Conference on,DOI: 10.1109/INVENTIVE.2016.7824809 [7] Pei-Yu Lin and Yi-Hui Chen, “QR code steganography with secret payload enhancement”, Multimedia & Expo Workshops (ICMEW), 2016 IEEE International Conference on, DOI: 10.1109/ICMEW.2016.7574744 [8] Kalpesh Adhatrao, Aditya Gaykar,” A Secure MethodFor Signing In Using Quick Response Codes With Mobile Authentication”, International Journal of Student Research in Technology & Management, Vol 1(1) pg 01- 11
Télécharger maintenant