Enhanced Recognition Based Image Authentication Scheme to Save System Time & Memory

Zeeshan I. Khan, V. Shandilya
{"title":"Enhanced Recognition Based Image Authentication Scheme to Save System Time & Memory","authors":"Zeeshan I. Khan, V. Shandilya","doi":"10.1109/IBSSC51096.2020.9332183","DOIUrl":null,"url":null,"abstract":"This paper presents an authentication scheme that contains images, alphabets, numbers and symbols. The primary aim of this research is to develop the authentication scheme using images as the front end data which makes it easy to remember for the user. But to store that selected images by the user in the backend (database), it takes a large amount of memory as well as processing time for password verification. To prevent this, the proposed method converts all the selected images in the string containing alphabets, numbers & symbols. This method focuses on recognition based image authentication scheme and also provides its two different ways of authentication. Sequential recognition based and Non-Sequential recognition-based image authentication schemes which will provide a facility to the user to verify its password sequentially or non-sequentially. At the user side, this authentication scheme is flexible & easy to remember. And at the system side, it provides low memory consumption and verifies the password in less amount of time. After the scheme is developed, the system time & memory is also calculated and analyzed. It has been observed that this scheme is saving the time and memory making the system advantageous.","PeriodicalId":432093,"journal":{"name":"2020 IEEE Bombay Section Signature Conference (IBSSC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE Bombay Section Signature Conference (IBSSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IBSSC51096.2020.9332183","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This paper presents an authentication scheme that contains images, alphabets, numbers and symbols. The primary aim of this research is to develop the authentication scheme using images as the front end data which makes it easy to remember for the user. But to store that selected images by the user in the backend (database), it takes a large amount of memory as well as processing time for password verification. To prevent this, the proposed method converts all the selected images in the string containing alphabets, numbers & symbols. This method focuses on recognition based image authentication scheme and also provides its two different ways of authentication. Sequential recognition based and Non-Sequential recognition-based image authentication schemes which will provide a facility to the user to verify its password sequentially or non-sequentially. At the user side, this authentication scheme is flexible & easy to remember. And at the system side, it provides low memory consumption and verifies the password in less amount of time. After the scheme is developed, the system time & memory is also calculated and analyzed. It has been observed that this scheme is saving the time and memory making the system advantageous.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于增强识别的图像认证方案节省系统时间和内存
本文提出了一种包含图像、字母、数字和符号的认证方案。本研究的主要目的是开发使用图像作为前端数据的身份验证方案,使其易于用户记忆。但是要将用户选择的图像存储在后端(数据库)中,需要大量内存以及密码验证的处理时间。为了防止这种情况,提出的方法转换字符串中包含字母,数字和符号的所有选定图像。该方法重点研究了基于识别的图像认证方案,并给出了两种不同的认证方式。基于顺序识别和基于非顺序识别的图像认证方案,这些方案将为用户提供顺序或非顺序验证其密码的设施。在用户端,该认证方案灵活且易于记忆。在系统端,它提供了低内存消耗,并在更短的时间内验证密码。设计方案后,对系统的时间和内存进行了计算和分析。该方案节省了时间和内存,使系统具有优势。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Multiclass Spoken Language Identification for Indian Languages using Deep Learning Enhancement of Nighttime Image Visibility Using Wavelet Fusion of Equalized Color Channels and Luminance with Kekre’s LUV Color Space The paradigm shift towards e-Teaching: SWOT analysis from the perspective of Indian teachers Childhood Medulloblastoma Classification Using EfficientNets Unsupervised machine learning in industrial applications: a case study in iron mining
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1