A NOVEL APPROACH OF AUTHENTICATION USING PIXEL VALUE GRAPHICAL PASSWORD SCHEME

A NOVEL APPROACH OF AUTHENTICATION USING PIXEL VALUE GRAPHICAL PASSWORD SCHEME

Author: MOHD SHUKRAN MOHD AFIZI

Publisher: Anchor Academic Publishing (aap_verlag)

Published: 2015-03-31

Total Pages: 123

ISBN-13: 3954899132

DOWNLOAD EBOOK

In decades, authentication system is relying on username and password as passphrase object for authentication process. The username and password mechanism bring major problem lately and raising the system developer worries on security for client server communication. Many methods and mechanisms are being introduced to overcome this authentication flaws. One of mechanism that has been introduce is graphical password mechanism on purpose to reduce human memory burden based on psychological study that shows human is better at recognizing and remembering images. However, the current method result many security flaw on graphical password authentication mechanism and require specific tool which is cannot be easily implement on any computer system platform. To overcome current method flaws, pixel value graphical password scheme is being introduced by combining the text-based password mechanism and graphical password mechanism where the authentication system extracting pixel value that resides in a digital image file. The extracted eight bits pixel value is used as the passphrase alongside with username during authentication process. The design and development of this method is based on identified graphical password enhancement and user requirement through literature review analysis. Results on literature analysis are being referred to develop the system flow and system design as the design concept which is being used for prototyping development. The developed prototype is being tested with several collections of image specimens as image experimental testing. Results and output from the testing show promising results as the result for Pixel Value graphical password scheme is bring an extremely positive impact. In other words, pixel value graphical password scheme is bringing graphical password scheme a secure promising authentication implementation.


International Conference on Intelligent Computing and Applications

International Conference on Intelligent Computing and Applications

Author: Subhransu Sekhar Dash

Publisher: Springer

Published: 2017-12-28

Total Pages: 662

ISBN-13: 9811055203

DOWNLOAD EBOOK

The book is a collection of best papers presented in International Conference on Intelligent Computing and Applications (ICICA 2016) organized by Department of Computer Engineering, D.Y. Patil College of Engineering, Pune, India during 20-22 December 2016. The book presents original work, information, techniques and applications in the field of computational intelligence, power and computing technology. This volume also talks about image language processing, computer vision and pattern recognition, machine learning, data mining and computational life sciences, management of data including Big Data and analytics, distributed and mobile systems including grid and cloud infrastructure.


Perfect Password

Perfect Password

Author: Mark Burnett

Publisher: Elsevier

Published: 2006-01-09

Total Pages: 200

ISBN-13: 0080489516

DOWNLOAD EBOOK

User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements. A typical computer user must remember dozens of passwords and they are told to make them all unique and never write them down. For most users, the solution is easy passwords that follow simple patterns. This book teaches users how to select strong passwords they can easily remember.* Examines the password problem from the perspective of the administrator trying to secure their network* Author Mark Burnett has accumulated and analyzed over 1,000,000 user passwords and through his research has discovered what works, what doesn't work, and how many people probably have dogs named Spot* Throughout the book, Burnett sprinkles interesting and humorous password ranging from the Top 20 dog names to the number of references to the King James Bible in passwords


Strengthening Forensic Science in the United States

Strengthening Forensic Science in the United States

Author: National Research Council

Publisher: National Academies Press

Published: 2009-07-29

Total Pages: 348

ISBN-13: 0309142393

DOWNLOAD EBOOK

Scores of talented and dedicated people serve the forensic science community, performing vitally important work. However, they are often constrained by lack of adequate resources, sound policies, and national support. It is clear that change and advancements, both systematic and scientific, are needed in a number of forensic science disciplines to ensure the reliability of work, establish enforceable standards, and promote best practices with consistent application. Strengthening Forensic Science in the United States: A Path Forward provides a detailed plan for addressing these needs and suggests the creation of a new government entity, the National Institute of Forensic Science, to establish and enforce standards within the forensic science community. The benefits of improving and regulating the forensic science disciplines are clear: assisting law enforcement officials, enhancing homeland security, and reducing the risk of wrongful conviction and exoneration. Strengthening Forensic Science in the United States gives a full account of what is needed to advance the forensic science disciplines, including upgrading of systems and organizational structures, better training, widespread adoption of uniform and enforceable best practices, and mandatory certification and accreditation programs. While this book provides an essential call-to-action for congress and policy makers, it also serves as a vital tool for law enforcement agencies, criminal prosecutors and attorneys, and forensic science educators.


Handbook Of Pattern Recognition And Computer Vision (2nd Edition)

Handbook Of Pattern Recognition And Computer Vision (2nd Edition)

Author: Chi Hau Chen

Publisher: World Scientific

Published: 1999-03-12

Total Pages: 1045

ISBN-13: 9814497649

DOWNLOAD EBOOK

The very significant advances in computer vision and pattern recognition and their applications in the last few years reflect the strong and growing interest in the field as well as the many opportunities and challenges it offers. The second edition of this handbook represents both the latest progress and updated knowledge in this dynamic field. The applications and technological issues are particularly emphasized in this edition to reflect the wide applicability of the field in many practical problems. To keep the book in a single volume, it is not possible to retain all chapters of the first edition. However, the chapters of both editions are well written for permanent reference. This indispensable handbook will continue to serve as an authoritative and comprehensive guide in the field.


Information Hiding

Information Hiding

Author: Fabien A. P. Petitcolas

Publisher: Springer Science & Business Media

Published: 2003-01-21

Total Pages: 438

ISBN-13: 3540004211

DOWNLOAD EBOOK

This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Information Hiding, IH 2002, held in Noordwijkerhout, The Netherlands, in October 2002. The 27 revised full papers presented were carefully selected during two rounds of reviewing and revision from 78 submissions. The papers are organized in topical sections on information hiding and networking, anonymity, fundamentals of watermarking, watermarking algorithms, attacks on watermarking algorithms, steganography algorithms, steganalysis, and hiding information in unusual content.


Chaos-based Cryptography

Chaos-based Cryptography

Author: Ljupco Kocarev

Publisher: Springer Science & Business Media

Published: 2011-06-17

Total Pages: 400

ISBN-13: 3642205410

DOWNLOAD EBOOK

Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection. The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics. The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.