A NOVEL APPROACH OF AUTHENTICATION USING PIXEL VALUE GRAPHICAL PASSWORD SCHEME

A NOVEL APPROACH OF AUTHENTICATION USING PIXEL VALUE GRAPHICAL PASSWORD SCHEME
Author :
Publisher : Anchor Academic Publishing (aap_verlag)
Total Pages : 123
Release :
ISBN-10 : 9783954899135
ISBN-13 : 3954899132
Rating : 4/5 (35 Downloads)

Book Synopsis A NOVEL APPROACH OF AUTHENTICATION USING PIXEL VALUE GRAPHICAL PASSWORD SCHEME by : MOHD SHUKRAN MOHD AFIZI

Download or read book A NOVEL APPROACH OF AUTHENTICATION USING PIXEL VALUE GRAPHICAL PASSWORD SCHEME written by MOHD SHUKRAN MOHD AFIZI and published by Anchor Academic Publishing (aap_verlag). This book was released on 2015-03-31 with total page 123 pages. Available in PDF, EPUB and Kindle. Book excerpt: In decades, authentication system is relying on username and password as passphrase object for authentication process. The username and password mechanism bring major problem lately and raising the system developer worries on security for client server communication. Many methods and mechanisms are being introduced to overcome this authentication flaws. One of mechanism that has been introduce is graphical password mechanism on purpose to reduce human memory burden based on psychological study that shows human is better at recognizing and remembering images. However, the current method result many security flaw on graphical password authentication mechanism and require specific tool which is cannot be easily implement on any computer system platform. To overcome current method flaws, pixel value graphical password scheme is being introduced by combining the text-based password mechanism and graphical password mechanism where the authentication system extracting pixel value that resides in a digital image file. The extracted eight bits pixel value is used as the passphrase alongside with username during authentication process. The design and development of this method is based on identified graphical password enhancement and user requirement through literature review analysis. Results on literature analysis are being referred to develop the system flow and system design as the design concept which is being used for prototyping development. The developed prototype is being tested with several collections of image specimens as image experimental testing. Results and output from the testing show promising results as the result for Pixel Value graphical password scheme is bring an extremely positive impact. In other words, pixel value graphical password scheme is bringing graphical password scheme a secure promising authentication implementation.


A NOVEL APPROACH OF AUTHENTICATION USING PIXEL VALUE GRAPHICAL PASSWORD SCHEME Related Books

A NOVEL APPROACH OF AUTHENTICATION USING PIXEL VALUE GRAPHICAL PASSWORD SCHEME
Language: en
Pages: 123
Authors: MOHD SHUKRAN MOHD AFIZI
Categories: Computers
Type: BOOK - Published: 2015-03-31 - Publisher: Anchor Academic Publishing (aap_verlag)

DOWNLOAD EBOOK

In decades, authentication system is relying on username and password as passphrase object for authentication process. The username and password mechanism bring
Advances in Computer Science and Information Technology. Computer Science and Engineering
Language: en
Pages: 667
Authors: Natarajan Meghanathan
Categories: Computers
Type: BOOK - Published: 2012-04-24 - Publisher: Springer

DOWNLOAD EBOOK

The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnolo
Usable, Secure and Deployable Graphical Passwords
Language: en
Pages: 189
Authors: Paul Dunphy
Categories: Computers
Type: BOOK - Published: 2013-01-10 - Publisher: Paul Dunphy

DOWNLOAD EBOOK

International Conference on Intelligent Computing and Applications
Language: en
Pages: 679
Authors: Subhransu Sekhar Dash
Categories: Technology & Engineering
Type: BOOK - Published: 2017-12-28 - Publisher: Springer

DOWNLOAD EBOOK

The book is a collection of best papers presented in International Conference on Intelligent Computing and Applications (ICICA 2016) organized by Department of
Visual Cryptography for Image Processing and Security
Language: en
Pages: 167
Authors: Feng Liu
Categories: Computers
Type: BOOK - Published: 2015-10-01 - Publisher: Springer

DOWNLOAD EBOOK

This book addresses the fundamental concepts in the theory and practice of visual cryptography. The design, construction, analysis, and application of visual cr