Open Access Open Access  Restricted Access Subscription Access

User Authentication Using Image Processing Techniques


Affiliations
1 Department of Computer Science & Engineering, S.J.M.I.T Chitradurga, Karnataka-577501, India
2 Department of Computer Science & Engineering, S.J.M.I.T Chitradurga, India
 

Conventional password transformation plot for client authentication in order to provide access to the system is to change password into some form of hash esteems. These secret word plans are nearly straightforward as well as quick in light of the fact that those depend on content and famed cryptography. In any case, those can be presented to digital assaults using secret key by cracking device or hash-breaking on the web locales. Assailants can altogether make sense of a unique secret word from hash esteem if it is generally basic and clear. Therefore, numerous hacking mishaps are happening transcendentally in frameworks receiving these hash oriented plans. This project recommends an upgraded secret word preparing plan in view of picture utilizing visual cryptography (VC). Not the same as the customary plan in light of hash and content, the proposed system changes a client identification word of plain text type into 2 pictures encoded by Visual Cryptography. The server just saves client identification word and one of the pictures rather than secret key. At the point when the client sign in and upload the other picture, then server extracts client identification word by using OCR (Optical Character Recognition). Thus, it confirms client through contrasting extricated ID and spared one. This proposed system has bring down calculation, counteracts digital assault went for hash splitting, and underpins confirmation not to uncover individual data, for example, ID to assailants.

Keywords

Visual Cryptography, User Authentication, Password Processing, Hash, OCR, Multimedia.
User
Notifications
Font Size

  • Noar M., Shamir A., Visual cryptography: Advances in Cryptography, Eurocrypt’94, Lecture Notes in Computer Science, vol. 950,Springer-Verlag. 1 – 12 1995.
  • Bailey, K., and Curran, K., “An Evaluation of Image Based Steganography Methods”, Journal of Multimedia Toolsand Applications, Vol. 30, No. 1, pp. 55-88, 2006.
  • Nguyen, Thi Thu Trang, and Quang Uy Nguyen, "An analysis of Persuasive Text Passwords, "Information and Computer Science (NICS), 2015 2nd National Foundation for Science and Technology Development Conference on. IEEE, 2015.
  • Tam, Leona, Myron Glassman, and Mark Vandenwauver, "The psychology of password management: a tradeoff between security and convenience, "Behaviour & Information Technology 29.3 (2010): 233- 244.
  • Gauravaram, Praveen, "Security Analysis of salt|| password Hashes," Advanced Computer Science Applications and Technologies (ACSAT), 2012 International Conference on. IEEE, 2012.
  • Dana Yang, Inshil Doh, Kijoon Chae, “Mutual Authentication based on Visual Cryptography and OCR for Secure IoT Service,” Source of the Document 2016 6th International Workshop on Computer Science and Engineering, WCSE 2016, 2016, Pages 214-219.
  • User athentication using visual cryptography. 2015 International Conference on Control, Communication & Computing India (ICCC) | 19-21 November 2015 | Trivandrum. Pages 647-652.
  • Analysis and Extraction of Password Image using Visual Cryptography and Steganography International Journal of Advanced Research in Computer Science and Software Engineering. Volume 7, Issue 5, May 2017 Pages 321-325.
  • Mori, Shunji, Ching Y. Suen, and Kazuhiko Yamamoto, "Historical review of OCR research and development," Proceedings of the IEEE 80.7 (1992): 1029-1058.
  • Patel, Chirag, Atul Patel, and Dharmendra Patel, "Optical character recognition by open source OCR tool tesseract: A case study," International Journal of Computer Applications 55.10 (2012).

Abstract Views: 187

PDF Views: 0




  • User Authentication Using Image Processing Techniques

Abstract Views: 187  |  PDF Views: 0

Authors

Nagabhushana
Department of Computer Science & Engineering, S.J.M.I.T Chitradurga, Karnataka-577501, India
T. V. Aravinda
Department of Computer Science & Engineering, S.J.M.I.T Chitradurga, Karnataka-577501, India
B. S. Nataraja
Department of Computer Science & Engineering, S.J.M.I.T Chitradurga, India

Abstract


Conventional password transformation plot for client authentication in order to provide access to the system is to change password into some form of hash esteems. These secret word plans are nearly straightforward as well as quick in light of the fact that those depend on content and famed cryptography. In any case, those can be presented to digital assaults using secret key by cracking device or hash-breaking on the web locales. Assailants can altogether make sense of a unique secret word from hash esteem if it is generally basic and clear. Therefore, numerous hacking mishaps are happening transcendentally in frameworks receiving these hash oriented plans. This project recommends an upgraded secret word preparing plan in view of picture utilizing visual cryptography (VC). Not the same as the customary plan in light of hash and content, the proposed system changes a client identification word of plain text type into 2 pictures encoded by Visual Cryptography. The server just saves client identification word and one of the pictures rather than secret key. At the point when the client sign in and upload the other picture, then server extracts client identification word by using OCR (Optical Character Recognition). Thus, it confirms client through contrasting extricated ID and spared one. This proposed system has bring down calculation, counteracts digital assault went for hash splitting, and underpins confirmation not to uncover individual data, for example, ID to assailants.

Keywords


Visual Cryptography, User Authentication, Password Processing, Hash, OCR, Multimedia.

References