Image and Video-based Graphical Password Authentication

B. N. V. V. P. Chimakurthi, K. Prakash
{"title":"Image and Video-based Graphical Password Authentication","authors":"B. N. V. V. P. Chimakurthi, K. Prakash","doi":"10.1109/ICEEICT53079.2022.9768604","DOIUrl":null,"url":null,"abstract":"Personal authentication is the procedure which is used numeral times around world by way of utilizing various methods and procedures. The best method for confirming an alphanumerical secret phrase is used for many years. Additionally, alphabet and passwords have enormous security issues like people forgetting key combinations due to difficult key combination selection. Additionally, when choosing a simple key aggregate, facilitates cybercriminals to decrypt their passwords more without problems. Regular passwords are susceptible to several sorts of attacks, for example, dictionary attacks, aggressive attacks, and malware. To offer a more secure and relaxed authentication method, a photographic authentication is presented on this page. Here we provide user protection and authentication. This paper includes parts, picture processing the usage of the selected click on vicinity and video processing the usage of click on durations, wherein your mixture of each will generate a password for the person to sign in. To log in, both combos have to be same. The user is allowed to pick his or her photograph and video alternatives and is saved on a notably non-public web site so that it isn't always accessible to different clients. The secret key produced for both previews and video is stowed away from the two clients and developers. This method is to be needed to save you unapproved get admission to large and selective information and to ensure it.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEEICT53079.2022.9768604","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Personal authentication is the procedure which is used numeral times around world by way of utilizing various methods and procedures. The best method for confirming an alphanumerical secret phrase is used for many years. Additionally, alphabet and passwords have enormous security issues like people forgetting key combinations due to difficult key combination selection. Additionally, when choosing a simple key aggregate, facilitates cybercriminals to decrypt their passwords more without problems. Regular passwords are susceptible to several sorts of attacks, for example, dictionary attacks, aggressive attacks, and malware. To offer a more secure and relaxed authentication method, a photographic authentication is presented on this page. Here we provide user protection and authentication. This paper includes parts, picture processing the usage of the selected click on vicinity and video processing the usage of click on durations, wherein your mixture of each will generate a password for the person to sign in. To log in, both combos have to be same. The user is allowed to pick his or her photograph and video alternatives and is saved on a notably non-public web site so that it isn't always accessible to different clients. The secret key produced for both previews and video is stowed away from the two clients and developers. This method is to be needed to save you unapproved get admission to large and selective information and to ensure it.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于图像和视频的图形密码认证
个人身份验证是一种在世界范围内被多次使用的程序,它利用了各种方法和程序。确认字母数字秘密短语的最佳方法已使用多年。此外,字母和密码有巨大的安全问题,如人们忘记了组合键,因为很难选择组合键。此外,当选择一个简单的密钥聚合时,有助于网络犯罪分子更轻松地解密密码。常规密码容易受到几种攻击,例如字典攻击、攻击性攻击和恶意软件。为了提供一种更安全、更轻松的身份验证方法,本文提出了一种图像身份验证方法。这里我们提供用户保护和身份验证。本文包括图片处理的使用选定的点击区域和视频处理的使用点击持续时间,其中你的混合将产生一个密码,供人登录。为了登录,两个连击必须相同。用户可以选择他或她的照片和视频替代品,并保存在一个特别非公开的网站上,这样不同的客户端就不能总是访问它。为预览版和视频制作的密钥对两个客户端和开发人员都是保密的。此方法是为节省您未经批准获得录取所需的大量和选择性信息而确保的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Packet Transmission using Radio Access Protocol for Intra-Cluster Communications in Mobile Ad hoc Networks Performance of Combined RF and non-RF based Energy Harvesting scheme for Multi-Relay Cooperative Cognitive Radio Network Image Recognition, Classification and Analysis Using Convolutional Neural Networks An Optimized technique for a Sapid Motor pooling Tariff Forecasting System Pneumothorax Segmentation from Chest X-Rays Using U-Net/U-Net++ Architectures
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1