Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7034082
R. Mahalakshmi, R. Vijayakarthika
The rapid growth of wireless devices has to a dramatically increased in the needs of spectrum access from wireless services. Cognitive Radio (CR) technology is a promising solution to enhance the spectrum utilization by enabling unlicensed users to exploit the licensed spectrum in an opportunistic manner. In this paper, sequential channel sensing problems for single and multiple secondary users (SUs) networks are powerfully modeled through finite state Markovian processes. The objective of this paper is to maximize the throughput for secondary user and reduced the number of handovers. A model for single user case is introduced and its performance is validated through analytical analysis. A modified p-persistent access (MPPA) protocol is proposed for multiple user. Since the method utilized experiences a high level of collision among the SUs, to mitigate the problem appropriately, p-persistent random access (PPRA) protocol is considered, which offers higher average throughput for SUs. The structure of the proposed scheme is discussed in detail, and its efficiencies are verified through a set of illustrative numerical result.
{"title":"Efficient channel sensing schemes for multiuser in mutichannel Cognitive Radio networks","authors":"R. Mahalakshmi, R. Vijayakarthika","doi":"10.1109/ICICES.2014.7034082","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034082","url":null,"abstract":"The rapid growth of wireless devices has to a dramatically increased in the needs of spectrum access from wireless services. Cognitive Radio (CR) technology is a promising solution to enhance the spectrum utilization by enabling unlicensed users to exploit the licensed spectrum in an opportunistic manner. In this paper, sequential channel sensing problems for single and multiple secondary users (SUs) networks are powerfully modeled through finite state Markovian processes. The objective of this paper is to maximize the throughput for secondary user and reduced the number of handovers. A model for single user case is introduced and its performance is validated through analytical analysis. A modified p-persistent access (MPPA) protocol is proposed for multiple user. Since the method utilized experiences a high level of collision among the SUs, to mitigate the problem appropriately, p-persistent random access (PPRA) protocol is considered, which offers higher average throughput for SUs. The structure of the proposed scheme is discussed in detail, and its efficiencies are verified through a set of illustrative numerical result.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"30 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81389305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033876
Madderi Sivalingam Saravanan, Jeyanta Kumar Singh, N. Thirumoorthy
The Radio Frequency Identification (RFID) system is combination of a tag and reader. The RFID tag provides a cost effective solution to identify the object. The object may be any living and non living. The RFID system is used many applications such as healthcare, sales supply chain, luggage identification and security enabled keys, etc. These applications were discussed in various research papers, but till now, no one introduced the food safety centre enabled RFID system. That is the physical factors affecting the food to get into contaminated need to be identified and remedy need to be taken for the same. This RFID system needs to be integrated with the Wireless Sensor Network (WSN) Enabled Architecture. So this system is called as RFID Sensor. This research paper also presents three various methodologies to identify the physical affect that affecting the food. At the end of this paper, discuss about how the RFID Sensor is going to be introduce in the Food Safety Centre in Indian Ration Shops.
{"title":"RFID sensors for food safety centre by identifying the physical factors that affecting the food","authors":"Madderi Sivalingam Saravanan, Jeyanta Kumar Singh, N. Thirumoorthy","doi":"10.1109/ICICES.2014.7033876","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033876","url":null,"abstract":"The Radio Frequency Identification (RFID) system is combination of a tag and reader. The RFID tag provides a cost effective solution to identify the object. The object may be any living and non living. The RFID system is used many applications such as healthcare, sales supply chain, luggage identification and security enabled keys, etc. These applications were discussed in various research papers, but till now, no one introduced the food safety centre enabled RFID system. That is the physical factors affecting the food to get into contaminated need to be identified and remedy need to be taken for the same. This RFID system needs to be integrated with the Wireless Sensor Network (WSN) Enabled Architecture. So this system is called as RFID Sensor. This research paper also presents three various methodologies to identify the physical affect that affecting the food. At the end of this paper, discuss about how the RFID Sensor is going to be introduce in the Food Safety Centre in Indian Ration Shops.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"19 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82526315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7034073
Y. Rao, E. Nagabhooshanam
This paper presents, a novel watermarking scheme for digital images which overcomes the problems associated with singular value decomposition. Here, the singular values of the host image are modified using the principal components of the watermark in the DWT domain for providing copyright protection as well as reliability. This method accomplishes with an incorporation of fractional singular values in the scheme for finding the optimum scaling factors for efficient robustness and the fidelity of the scheme. By using this method we could eliminate the false positive problem and diagonal line problem which were found in the traditional singular value decomposition, the proposed scheme is tested under various forms of image processing attacks like noise addition, median filtering, JPEG compression, Geometric cropping Experimental results are provided to illustrate that the proposed scheme succeeded in providing copyright protection.
{"title":"A novel image zero-watermarking scheme based on DWT-BN-SVD","authors":"Y. Rao, E. Nagabhooshanam","doi":"10.1109/ICICES.2014.7034073","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034073","url":null,"abstract":"This paper presents, a novel watermarking scheme for digital images which overcomes the problems associated with singular value decomposition. Here, the singular values of the host image are modified using the principal components of the watermark in the DWT domain for providing copyright protection as well as reliability. This method accomplishes with an incorporation of fractional singular values in the scheme for finding the optimum scaling factors for efficient robustness and the fidelity of the scheme. By using this method we could eliminate the false positive problem and diagonal line problem which were found in the traditional singular value decomposition, the proposed scheme is tested under various forms of image processing attacks like noise addition, median filtering, JPEG compression, Geometric cropping Experimental results are provided to illustrate that the proposed scheme succeeded in providing copyright protection.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"28 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81048972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7034105
Anila P. George, M. Sujatha
This paper analyses the characteristics of dual spiral antenna with varying length. This antenna is operated in the lower band of the radio frequency range, since human body absorbs the microwave signals. Here the concept of multilayer substrate is used in order to reduce the size of the antenna. The existing system has several limitations. Firstly, most capsules are powered by an internal battery cell that restricts capsule miniaturization. Secondly, current systems are incapable of maintaining a continuous communication link due to the random orientations of the capsule. Therefore an efficient communication link between the in-body capsule and the external receiver unit is important for the development and applicability of the Wireless Capsule Endoscopy (WCE). These limitations are overcome by this proposed antenna. Since the proposed antenna provides an omnidirectional radiation pattern and ultra wide bandwidth for short distance communication between transmitting and the receiving antenna with low power consumption. By combining two spiral antennas with different radius of the radiation zone, the Standing Wave Ratio (SWR) can be kept low for a large bandwidth, resulting in an improved spiral antenna performance.
{"title":"Imbedded spiral antenna for endoscope","authors":"Anila P. George, M. Sujatha","doi":"10.1109/ICICES.2014.7034105","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034105","url":null,"abstract":"This paper analyses the characteristics of dual spiral antenna with varying length. This antenna is operated in the lower band of the radio frequency range, since human body absorbs the microwave signals. Here the concept of multilayer substrate is used in order to reduce the size of the antenna. The existing system has several limitations. Firstly, most capsules are powered by an internal battery cell that restricts capsule miniaturization. Secondly, current systems are incapable of maintaining a continuous communication link due to the random orientations of the capsule. Therefore an efficient communication link between the in-body capsule and the external receiver unit is important for the development and applicability of the Wireless Capsule Endoscopy (WCE). These limitations are overcome by this proposed antenna. Since the proposed antenna provides an omnidirectional radiation pattern and ultra wide bandwidth for short distance communication between transmitting and the receiving antenna with low power consumption. By combining two spiral antennas with different radius of the radiation zone, the Standing Wave Ratio (SWR) can be kept low for a large bandwidth, resulting in an improved spiral antenna performance.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81151644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033933
C. K. Sivashankari
In this paper, a production inventory model with defective items in which two levels of production are considered and it is possible that production started at one rate and after some time it may be switched over another rate such a situation is desirable in the sense that by starting at a low rate of production, a large quantum stock of manufacturing items at the initial stage is avoided, leading to reduction in the holding cost. A suitable mathematical model is developed and the optimal production lot size which minimizes the total cost is derived. The optimal solution is derived and an illustrative example is provided and numerically verified. The validation of result in this model was coded in Microsoft Visual Basic 6.0.
{"title":"Production inventory model for two levels of production with defective items and shortages","authors":"C. K. Sivashankari","doi":"10.1109/ICICES.2014.7033933","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033933","url":null,"abstract":"In this paper, a production inventory model with defective items in which two levels of production are considered and it is possible that production started at one rate and after some time it may be switched over another rate such a situation is desirable in the sense that by starting at a low rate of production, a large quantum stock of manufacturing items at the initial stage is avoided, leading to reduction in the holding cost. A suitable mathematical model is developed and the optimal production lot size which minimizes the total cost is derived. The optimal solution is derived and an illustrative example is provided and numerically verified. The validation of result in this model was coded in Microsoft Visual Basic 6.0.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"32 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91078982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7034113
R. Subbulakshmi, P. T. Sivagurunathan
In this paper Micro strip Probe feed Circular patch antenna is designed with and without sorting vias. Such circular patch antenna is shorted concentrically with a set of conductive vias. This type of antenna can produce a monopole-like radiation pattern with wide impedance bandwidth characteristics. The patch antenna is designed and simulated on HFSS simulation software and it is designed to operate in S-band frequency range 2.4GHz. In this analysis, we have analyzed the antenna parameters such as gain, impedance, Radiation Pattern and VSWR. This antenna is highly suitable for S-band applications such as satellite communication, Radar, Medical applications, and other Wireless systems.
{"title":"Microstrip circular patch antenna using with and without sorting vias","authors":"R. Subbulakshmi, P. T. Sivagurunathan","doi":"10.1109/ICICES.2014.7034113","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034113","url":null,"abstract":"In this paper Micro strip Probe feed Circular patch antenna is designed with and without sorting vias. Such circular patch antenna is shorted concentrically with a set of conductive vias. This type of antenna can produce a monopole-like radiation pattern with wide impedance bandwidth characteristics. The patch antenna is designed and simulated on HFSS simulation software and it is designed to operate in S-band frequency range 2.4GHz. In this analysis, we have analyzed the antenna parameters such as gain, impedance, Radiation Pattern and VSWR. This antenna is highly suitable for S-band applications such as satellite communication, Radar, Medical applications, and other Wireless systems.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"1 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90000405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7034063
S. Sridharan
This paper focuses on providing a secure, authentic and user-friendly mechanism for both the customer's of the bank holding a locker and the branch head's involvement in all the operations pertaining to the safety lockers. The primary aim of this paper is to provide a solution towards a complete biometric based authentication mechanism for operating the safety lockers. This system rests on improving the current fact that all the lockers that operates currently operates only with the help of two different keys - one the branch head's key and other the user key. Improvement towards the current model that relies heavily on the key of the user is proposed which helps in the functioning of the locker with bio-metric and secret code (password). The main features that are proposed in the new mechanism is the two level authentication - one by the branch head and one by the user for their identities, secure individual authentication with their bio-metrics and the access only to the concerned individuals for their safety lockers. The branch head responsible for the operation of the safety deposits is assigned in a daily basis by the central regional office of that particular bank.
{"title":"Authenticated secure bio-metric based access to the bank safety lockers","authors":"S. Sridharan","doi":"10.1109/ICICES.2014.7034063","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034063","url":null,"abstract":"This paper focuses on providing a secure, authentic and user-friendly mechanism for both the customer's of the bank holding a locker and the branch head's involvement in all the operations pertaining to the safety lockers. The primary aim of this paper is to provide a solution towards a complete biometric based authentication mechanism for operating the safety lockers. This system rests on improving the current fact that all the lockers that operates currently operates only with the help of two different keys - one the branch head's key and other the user key. Improvement towards the current model that relies heavily on the key of the user is proposed which helps in the functioning of the locker with bio-metric and secret code (password). The main features that are proposed in the new mechanism is the two level authentication - one by the branch head and one by the user for their identities, secure individual authentication with their bio-metrics and the access only to the concerned individuals for their safety lockers. The branch head responsible for the operation of the safety deposits is assigned in a daily basis by the central regional office of that particular bank.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"44 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87881818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033930
Nitesh Kumar, Ashish Kumar, Soumyajit Giri
Transaction is a set of/unit of sequential operations, which is used for a purpose of Technological, Organizational, programming languages, and operating systems. It examines the performance of the transaction manager with the help of Remote Procedure Calls (RPC) Applications. Remote Procedure Call is a distributed application for constructing the distributed database system. When it communicates between the sender side (client side) and receiver side (server side). It executes the ensure atomicity protocols. Simple optimization of Two Phase Commit Protocol (2PC) reduces non-blocking commit, logging activity, multi-threading design, and improved throughput, reduce multicasting, and reduces the variance of distributed commit protocol. It is totally based on Three Phase Commit Protocol (3PC) in a communication network infrastructure environment such as (LAN, WAN, MAN, etc.), and the performance of the transaction mechanism such as RPC Techniques depends upon the client and server performance. In this paper, we provide a detail examination of the design and performance of the transaction manager of the RPC Applications and we also compile the code and it's create a file, then after that it will execute the code step by step.
{"title":"Design and implementation of Three Phase Commit Protocol (3PC) directory structure through Remote Procedure Call (RPC) application","authors":"Nitesh Kumar, Ashish Kumar, Soumyajit Giri","doi":"10.1109/ICICES.2014.7033930","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033930","url":null,"abstract":"Transaction is a set of/unit of sequential operations, which is used for a purpose of Technological, Organizational, programming languages, and operating systems. It examines the performance of the transaction manager with the help of Remote Procedure Calls (RPC) Applications. Remote Procedure Call is a distributed application for constructing the distributed database system. When it communicates between the sender side (client side) and receiver side (server side). It executes the ensure atomicity protocols. Simple optimization of Two Phase Commit Protocol (2PC) reduces non-blocking commit, logging activity, multi-threading design, and improved throughput, reduce multicasting, and reduces the variance of distributed commit protocol. It is totally based on Three Phase Commit Protocol (3PC) in a communication network infrastructure environment such as (LAN, WAN, MAN, etc.), and the performance of the transaction mechanism such as RPC Techniques depends upon the client and server performance. In this paper, we provide a detail examination of the design and performance of the transaction manager of the RPC Applications and we also compile the code and it's create a file, then after that it will execute the code step by step.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"140 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86661611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7034171
J. P. Singh, P. Singh, B. K. Roy
In this paper synchronization of two different chaotic systems is proposed using Sliding Mode Control scheme. Lu chaotic system is used as master system and Bhalekar-Gejji chaotic system is used as slave system. Convergence of the synchronizing error is achieved using the Lyapunov stability theory. Synchronization of master and slave system is achieved using the PI (Proportional-Integral) switching surface of the sliding mode control scheme. Finally, numerical simulations are proposed to demonstrate the effectiveness of proposed synchronization strategy.
{"title":"Synchronization of Lu and Bhalekar-Gejji chaotic systems using sliding mode control","authors":"J. P. Singh, P. Singh, B. K. Roy","doi":"10.1109/ICICES.2014.7034171","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034171","url":null,"abstract":"In this paper synchronization of two different chaotic systems is proposed using Sliding Mode Control scheme. Lu chaotic system is used as master system and Bhalekar-Gejji chaotic system is used as slave system. Convergence of the synchronizing error is achieved using the Lyapunov stability theory. Synchronization of master and slave system is achieved using the PI (Proportional-Integral) switching surface of the sliding mode control scheme. Finally, numerical simulations are proposed to demonstrate the effectiveness of proposed synchronization strategy.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87432282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033936
P. Umadevi, V. Saranya
People enjoy the convenience of on-line services, Automated Teller Machines (ATMs), and pervasive computing, but online environments, ATMs, and pervasive computing may bring many risks by adversaries. To prevent users passwords from adversaries by implementing a differentiated virtual password concept in which a user has the freedom to choose a virtual password scheme ranging from weak security to strong security, where a virtual password requires a small amount of human computing to secure users passwords. A user-specified function/program is used to implement the virtual password concept with a tradeoff of security for complexity requiring a small amount of human computing. Further we propose several functions to serve as system recommended functions and provide a security analysis. For user-specified functions, we adopt a secret little functions in which security is enhanced by hiding secret functions/algorithms. Analyze how the proposed scheme defends against phishing, key logger, and shoulder-surfing attacks. The virtual password mechanism is the first one which is able to defend against all three attacks together.
{"title":"Stronger authentication for password using virtual password and secret little functions","authors":"P. Umadevi, V. Saranya","doi":"10.1109/ICICES.2014.7033936","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033936","url":null,"abstract":"People enjoy the convenience of on-line services, Automated Teller Machines (ATMs), and pervasive computing, but online environments, ATMs, and pervasive computing may bring many risks by adversaries. To prevent users passwords from adversaries by implementing a differentiated virtual password concept in which a user has the freedom to choose a virtual password scheme ranging from weak security to strong security, where a virtual password requires a small amount of human computing to secure users passwords. A user-specified function/program is used to implement the virtual password concept with a tradeoff of security for complexity requiring a small amount of human computing. Further we propose several functions to serve as system recommended functions and provide a security analysis. For user-specified functions, we adopt a secret little functions in which security is enhanced by hiding secret functions/algorithms. Analyze how the proposed scheme defends against phishing, key logger, and shoulder-surfing attacks. The virtual password mechanism is the first one which is able to defend against all three attacks together.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"71 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88535490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}