Multi-factor Authentication in Banking Sector
|
|
|
- Marsha Gibbs
- 10 years ago
- Views:
Transcription
1 Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering & Research, Nagpur,India. Abstract-In the world of Internet, security is the major concern to avoid fekes and forgeries. Internet does not use secure links, thus it is necessary to provide security measures against the most common attacks on web-applications. Since now a days all the transactions are done via Internet so it s an urgent need to protect the data from malicious attacks. The purpose of this project is to develop a secure multi-factor authentication that would provide high security in their own web-applications. The risks of using static passwords to authenticate users show more and more security risks with the development of hacking. In this paper, we introduce a DCT based steganographic method for data hiding. The embedding approach is designed to satisfy three goals; maximizing the amount of hidden message, minimizing difference between the cover image and stego-image, and maximizing the robustness of embedding. This paper gives a solution to implement Multi-factor authentication. Keywords-Multi-factor Authentication,Single-Factor Authentication, Discrete Cosine Transform (DCT), Steganography. 1. INTRODUCTION Security and usability in web application s aretwo important factors that are designed to prevent from malicious attack. As the communication increases day by day the value for security over network also increases. Presently, most users need to use user name and password to log on for authentication. Passwords used in systems, such as system, online banking, are most static. But static passwords don t provide security. One advantage is that static passwords are easy to remember. But There are many disadvantages of static passwords that includes how easy they Are to decipher. Also they are vulnerable to social engineering, i.e., people asking for passwords or guessing them correctly. Nowadays it is not a hard job to obtain passwords by using hacking tools. There-fore, a more secure multi-factor authentication mechanism is needed. 1.1 Multi-factor Authentication Multifactor Authentication is the latest secure authentication technique. Since Single-factor authentication (SFA) have been used widely. It is not secure enough for online financial transactions. Single factor authentication has been around for a while now. Yet it s not enough for having any meaningful security. The solution is to have multi-factor authentication which includes following authentication factors: Username Question Answer Verification Image Authentication Password The security levels are increased by using multiple authenticating factors. Multi-factor authentication adds more Security because the user must provide more than one secret Entity i.e. the security question. The Image response confirmation of a previously saved image allocated to each user during registration into the authentication server gives user satisfaction that he is on correct site. This prevents us from Phishing attack. Random number created by system is made by using current date and time of registration. This increases more security as date and time is unique each time user registers. Main Objective of MFA is to provide security to online transactions Fig. 1: Registration Process Registration Process : For Authentication user have to go through different steps. When user registers to Bank site, he first enters his User Name then he has to select the Question and Answer it uniquely. After following these steps set of Images are shown to user and he has to select the one. This Image response confirmation is given to user at the time of log in,
2 This selected image is saved in the authentication server, server then shows this selected image during log in time that you have selected this image during registration. This gives user satisfaction that he is on correct site. This prevents user from Phishing attack. After that system will generate the password which is of six digit using Walsh algorithm[1]. Password generation is based on current date, time, minute, second. At what time and at which date user is registering to bank site using that date and time password is generated which is unique at each minute and at each second. Increasing security levels increases efforts to be spent in order to hack the system What is Steganography? There is another important issue of steganography, Steganography[4] is the science of covered writing. Its purpose is to hide information in a cover medium so that it is hard for everyone to detect the existence of the embedded information. By embedding a secret message into image, a stego-image is obtained. It is important that the stego-image does not contain any easily detectable information. The embedding is typically parametrised by a key; without knowledge of this key it is difficult for a hacker to detect or remove the embedded material. Once the cover object has material embedded in it, it is called a stego object. Some papers introduced the utilization of various embedding techniques in DCT domain [4, 5]. 2. LITERATURE REVIEW In literature review we focuses on insecurity in web applications and try to find evidence of principles, methods, and tools that can clarify the need for security, and usability. Our focus is primarily on web-based authentication systems. The focus of this review is those authentication methods that regular people use on a daily basis. Initially, our user domain is populated with home users, businessman s, and so forth. The rest of this paper is organized as follows. The first section deals with describing and understanding the users of online authentication, their perceptions towards security, discussing notions of risk, and privacy in this context. Section 2 goes along a different path, as we introduce the most common authentication method used on the internet today: passwords; to get more security we introduce new technique called Multi-factor Authentication. Section 3 deals with those usability factors important when designing usable security. In section 4 we introduce current methods for developing usable security software. Some algorithms are used and their implementation is carried out. We conclude the review by outlining recommendations for further research and development. 3. PROBLEM DEFENITION Before MFA Single-factor authentication (SFA) have widely used. It is not secure enough for online financial transactions. Single-factor authentication is not secure nowa-days. It uses only user name and password to authenticate the user. Passwords used in Single-factor authentication are static in nature. Most people can agree on the fact that the longer the password, the better the protection of the service it grants access to. Three reasons are obvious: The time it takes to input the password naturally grows as the length grows, There is a more possibility for typing errors, and Very few people are capable of memorising passwords of such lengths. 3.1 Weak Single-factor Authentication There is one main advantage and many disadvantages to weak single-factor authentication, which many are more familiar with as the single static passwords still employed by most companies. One advantage is that static passwords are easy to remember. However, when different systems have different passwords, they can be difficult to remember and may have to be written down, raising their vulnerability. The many disadvantages of single static passwords include how easy they are to decipher. Most often, they are short and based on subjects close to the user birthdays, nick names, children s names and so on. Multi-factor authentication seeks to decrease the problem of static password. It includes more authentication levels to log on,namely Username, Password, Question Answer verification, and Image Authentication. 4. PROPOSED SYSTEM Data hiding techniques have been widely used to hide secret message for long time. Ensuring data security is a big challenge for us. Businessmen, professionals, and home users all have some important data that they want to secure from others. In this proposed system we are generating password by using Walsh algorithm and encrypting it in image using DCT algorithm. This system combines the effect of these two methods to enhance the security of the data. The proposed system encrypts the data and then embeds the encrypted data in an cover file. This system improves the security of the data by embedding the encrypted data and not the plain data in image. The block diagram of proposed system is as shown in fig 2 Fig. 2: Block diagram of proposed system Above figure depicts the encoding and decoding of password in image. Encoding of password is done when
3 User registers to bank site, enters his/her details and password generated by system is encrypted in image On the other hand, As soon as user enters password to Log in, System apply the inverse DCT in order to get the encrypted key from Lena image and if calculated answer match the encrypted key user is permissible to access account otherwise he has to enter correct password. We have introduced a new randomization method for generating the randomized key. 4.1 Proposed Work During registration, System itself generates password by using Walsh Algorithm[1],and during log in time when user enters password, it will not directly save in database instead, it will save in the Lena image. password is embedded in image by using DCT Algorithm[2] Walsh Transform: Walsh transform[1] makes the image compression algorithm orthogonal transform stage more fast and easy. This method increases the Walsh-based image compression algorithm speed by 30% for compression and by 60% for decompression. The JPEG algorithm is a de-facto standard for image compression. It is the lossy compression algorithm based on DCT (Discrete Cosine Transform). The natural ordered Hadamard matrix is defined by the formula, and the sequency ordered Hadamard matrix is formed by rearranging the rows so that the number of signchanges in a row is in increasing order. The Hadamard matrices of dimension 2 k for k N are given by the recursive formula The lowest order of Hadamard matrix is 2 and in general for 2 k N, where denotes the Kronecker product. The Walsh matrix (and Walsh functions) are used in computing the Walsh transform and have applications in the efficient implementation of certain signal processing operations Discrete Cosine Transform: A discrete cosine transform[2] expresses a finite sequence of data points in terms of sum of cosine functions oscillating at different frequencies. DCTs are important to numerous applications in science and engineering, from lossy compression of audio (e.g. MP3) and images (e.g. JPEG) (where small high-frequency components can be discarded). DCT is a general transform for digital image processing and signal processing with advantages such as high compression ratio, small bit error rate, good calculation complexity. DCT allows an image to be broken up into different frequency bands namely the high, middle and low frequency bands thus making it easier to choose the band. In DCT based techniques, DCT coefficients are obtained for the given carrier image. The secret data is embedded in the carrier image for DCT coefficients lower than the threshold value. To avoid visual distortion, embedding of secret information is avoided for DCT coefficient value 0. Insertion and extraction of secret image is an important part for any steganographic technique Modules of our Project are: Password Generation : Walsh Algorithm is use to generate the password.it uses the 2*2,4*4 matrix to arrange the elements. The lowest order of Hadmard matrix is 2*2. Formula is : Password Encryption : The stego-image quality and message capacity are the two most important criteria in evaluating a steganographic method. Thus, we focus on these two criteria. During registration, System itself generates password by using Walsh Algorithm as stated above, and during log in time when user enters password, it will not directly save in database instead, it will save in the Lena image. Password is encrypted in image by using DCT algorithm[3]. DCT has advantages such as high compression ratio, small bit error rate, good calculation complexity. It allows an image to be broken up into different frequency bands namely the high, middle and low frequency bands thus making it easier to choose the band. Multiple factors are present in MFA. The first factor is usually in the form of PIN or password that the user types, for instance, into a web-based Internet application. The second factor is usually in the form of mobile phone that is known to be able to receive OTP as SMS directed to a particular mobile phone number. The same process is followed in communication between sender and receiver. The proposed scheme consists of two processes, the hiding process and the extraction process. Suppose a sender wants to share some information with a receiver. The sender uses the hiding process to hide the information in a cover image and then delivers the stego image to the receiver. When the receiver receives the stego image, the extraction process is used to decode the stego image and to extract the information.if the user successfully retypes this OTP into the web application.password is stored in Lena image anywhere belonging to any pixel value. The encrypted message is
4 stored in the background of image.if we open this image in notepad it shows byte code which human can't read.if we try to see this password even also it is invisible like this : 5. SYSTEM ARCHITECTURE Figure 3 shows secret message encrypted in Lena image Fig 4: Authentication Process Figure 4 shows the original image and encrypted image with its histogram Password Decryption: After Registration, when user Logs In, password entered by him is verified by using Inverse DCT. User enters password to Log in, System apply the inverse DCT in order to get the encrypted key from Lena image and if calculated answer match the encrypted key user is permissible to access account otherwise he has to enter correct password 5. CONCLUSION In this paper, we proposed the process of multi-factor authentication of user identity can be achieved through the dynamic password provided by system during registration. The reliability of verification is improved and all user information verified will be stored in the system for later use. The goal of data hiding is to make the secret messages hidden in the cover-images. We proposed a simple and efficient information-hiding scheme based on the quantization based embedding technique for images. We compared the image quality and hiding capacity of the proposed method. The observations on the visual quality of the stego-images and encrypted images in the proposed method were also given. The proposed scheme can not only conceal large amount of secret information in the cover images but can also repair the stego image to generate the repaired image, which only has a small distortion compared with the original cover image. ACKNOWLEDGMENT We are sincerely expresses our gratitude to Department of Computer Science for providing necessary help and assistance. Our thanks to Prof. Pooja Dubey who guided us to develop such an innovative idea and who have contributed towards development of the template
5 REFERENCES [1] A.Pratt,"Hadamard Transform Image Coding," Proceedings of the IEEE, vol. 57, No. 1, Jan., [2] Sican Gmbh Method and circuit for forward/inverse discrete cosine transform (DCT/IDCT) Dec1,1995 [3] K. WONG and K. TANAKA, StegErmelc: A Novel DCT-Based Steganographic Method Using Three Strategies, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2008 E91-A(10): [4] K.B. Raja, C.R. Chowdary, K.R. Venugopal, L.M. Patnaik, A Secure Image Steganography Technique,ICISIP 2005 Third International Conference on Intelligent Sensing and Information Processing 2005,Sp.p [5] K. Wong, X. Qi,Tanaka, A DCT-based Mod4 method Steganographic, Signal Processing , p.p [6] P. Dourish, R. E. Grinter, J. D. de la Flor, and M. Joseph. Security in the wild: User strategies for managing security as an everyday, practical problem.8: , [7] Hsu,C.-T.,Wu,J.-L,(1998)"Multiresolution Watermarking for Digital images", in IEEE Transactions on Circuits and Systems - II: Analog and Digital Signal Processing, vol. 45,no. 8, pp
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE
Image Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
Safer data transmission using Steganography
Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: [email protected],
Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Authentication
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 FACULTY OF COMPUTER SYSTEM AND SOFTWARE ENGINEERING 2012/2013 1 ABSTRACT Steganography is the art or science in hiding. It is origin from
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and
INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY. Implementation of Multi-Factor Authentication Scheme
IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY Implementation of Multi-Factor Authentication Scheme Vasundhara Bhele Prof. Nilesh Chaubey Prof. Shyam Dubey Computer Science &
Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah
Reversible Data Hiding for Security Applications
Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.
Triple Security of Information Using Stegnography and Cryptography
Triple Security of Information Using Stegnography and Cryptography Abstract In this growing age information sharing and transfer has increased exponentially so, security is a primary requirement for all
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
A Secure Data Transmission By Integrating Cryptography And Video Steganography
A Secure Data Transmission By Integrating Cryptography And Video Steganography Shafna P K Computer Science Department KMEA Engineering College Ernakulam, India [email protected] Abstract Advances
A Concept of Digital Picture Envelope for Internet Communication
A Concept of Digital Picture Envelope for Internet Communication Eiji Kawaguchi, Koichi Nozaki, Michiharu Niimi, Hideki Noda and Richard O. Eason Kyushu Institute of Technology 1-1 Sensui-cho, Tobata,
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
WATERMARKING FOR IMAGE AUTHENTICATION
WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA [email protected] K.
A comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
Online Voting System Using Three Factor Authentication
ISSN(Online): 232-98 Vol. 3, Issue 3, March 25 Online Voting System Using Three Factor Authentication Rashmi Nade, Monali Raut, Punam Agawane, Jayshree Shinde Student, Dept. of I.T., BVCOEW, Savitribai
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,
2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique
Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique B.Sai Kiran M.Tech (VLSI), CMR Institute of Technology. Mr.Shahbaz Khan Associate Professor, CMR Institute of Technology.
Online Voting System Powered by Biometric Security using Cryptography and Stegnography
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Online
Security and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
Cardless Cash Access Using Biometric ATM Security System Neenu Preetam. I 1, Harsh Gupta 2
Cardless Cash Access Using Biometric ATM Security System Neenu Preetam. I 1, Harsh Gupta 2 1, 2 M.Tech. (Microelectronics), Department of ECE, SEEC, Manipal University Jaipur (MUJ), Rajasthan, India Abstract:
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and
Implementation of a Prototype for Secure Online Payment System Using Discrete Cosine Transformation and Permutative Straddling
Implementation of a Prototype for Secure Online Payment System Using Discrete Cosine Transformation and Permutative Straddling GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering
One Time Password Generation for Multifactor Authentication using Graphical Password
One Time Password Generation for Multifactor Authentication using Graphical Password Nilesh B. Khankari 1, Prof. G.V. Kale 2 1,2 Department of Computer Engineering, Pune Institute of Computer Technology,
An Enhanced Countermeasure Technique for Deceptive Phishing Attack
An Enhanced Countermeasure Technique for Deceptive Phishing Attack K. Selvan 1, Dr. M. Vanitha 2 Research Scholar and Assistant Professor, Department of Computer Science, JJ College of Arts and Science
INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010
Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication
Secure Authentication of Distributed Networks by Single Sign-On Mechanism
Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,
Video-Conferencing System
Video-Conferencing System Evan Broder and C. Christoher Post Introductory Digital Systems Laboratory November 2, 2007 Abstract The goal of this project is to create a video/audio conferencing system. Video
Security Based Data Transfer and Privacy Storage through Watermark Detection
Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant
Introduction to Medical Image Compression Using Wavelet Transform
National Taiwan University Graduate Institute of Communication Engineering Time Frequency Analysis and Wavelet Transform Term Paper Introduction to Medical Image Compression Using Wavelet Transform 李 自
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM
IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM BARJINDER SINGH 1, BALPREET KAUR 2, RANJOT KAUR 3 1 Research Scholar at BBSBEC, Fatehgarh sahib 2 Lecturer at BBSBEC Fatehgarh
A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION
A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION Prof. Dr. Alaa Hussain Al- Hamami, Amman Arab University for Graduate Studies [email protected] Dr. Mohammad Alaa Al-
ABSTRACT I. INTRODUCTION
Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune
SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE
SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE Manoj S. Rewatkar 1 and Shital A. Raut 2 1,2 Department of Computer Science and Engineering, Visvesvaraya National Institute of Technology, Nagpur,
Soumendu Chakraborty, Anand Singh Jalal* and Charul Bhatnagar
----------------------------------------------------------------------------- An Efficient Bit Plane X-ORing Algorithm for Irreversible Image Steganography -----------------------------------------------------------------------------
MULTIFACTOR AUTHENTICATION FOR SOFTWARE PROTECTION
Diyala Journal of Engineering Sciences Second Engineering Scientific Conference College of Engineering University of Diyala 16-17 December. 2015, pp. 479-492 ISSN 1999-8716 Printed in Iraq MULTIFACTOR
Preventing Identity Theft using Shift Key mechanism and QR Code with Sudoku Puzzle
DOI 10.4010/2014.282 ISSN-2321-3361 2014 IJESC Research Article Preventing Identity Theft using Shift Key mechanism and QR Code with Sudoku Puzzle R.Saisrikanth Department of Computer Science and Engineering
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department
ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security
I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero
Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography
502 Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography 1 Vinay Wadekar, 2 Ajinkya Jadhavrao, 3 Sharad Ghule, 4 Akshay Kapse 1,2,3,4 Computer Engineering, University Of Pune, Pune,
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)
Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- [email protected] Objective: A study, implementation and comparison of
Integration of Sound Signature in 3D Password Authentication System
Integration of Sound Signature in 3D Password Authentication System Mr.Jaywant N. Khedkar 1, Ms.Pragati P. Katalkar 2, Ms.Shalini V. Pathak 3, Mrs.Rohini V.Agawane 4 1, 2, 3 Student, Dept. of Computer
Steganography and Visual Cryptography in Computer Forensics
2010 Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering Steganography and Visual Cryptography in Computer Forensics George Abboud Department of Computer Engineering and
Protected Cash Withdrawal in Atm Using Mobile Phone
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar
CHAPTER 2 LITERATURE REVIEW
11 CHAPTER 2 LITERATURE REVIEW 2.1 INTRODUCTION Image compression is mainly used to reduce storage space, transmission time and bandwidth requirements. In the subsequent sections of this chapter, general
A Digital Audio Watermark Embedding Algorithm
Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China [email protected],
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING 1 Maulik Srivastava, 2 Anuradha Sharma 1,2 Department of Computer Science & Engineering, Amity University, Uttar Pradesh Abstract: As we all know
Turgut Ozal University. Computer Engineering Department. TR-06010 Ankara, Turkey
Dr. YILDIRAY YALMAN Associate Professor CONTACT INFORMATION Turgut Ozal University Computer Engineering Department TR-06010 Ankara, Turkey Phone: +90 (0)312-5515437 E-mail: [email protected] RESEARCH
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications G.Prakash #1, M.Kannan *2 # Research Scholar, Information and Communication Engineering, Anna University
Figure 1: Relation between codec, data containers and compression algorithms.
Video Compression Djordje Mitrovic University of Edinburgh This document deals with the issues of video compression. The algorithm, which is used by the MPEG standards, will be elucidated upon in order
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
International ejournals
ISSN 0976 1411 Available online at www.internationalejournals.com International ejournals International ejournal of Mathematics and Engineering 227 (2013) 2216-2222 EFFICIENT METHOD OF AUDIO STEGANOGRAPHY
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD Ms. Shubhangi Edake 1, Prof. Sunil Rathod 2 1 PG Student, Computer Engineering, Dr.D.Y.Patil School of Engineering, Lohgaon,Pune,India 2 Assistant
A secure email login system using virtual password
A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {[email protected]} 2 SVNIT, Surat,Gujarat,India 2 {[email protected]}
A MELIORATED APPROACH TO TEXT STEGANOGRAPHY USING MARKUP LANGUAGES AND AES
A MELIORATED APPROACH TO TEXT STEGANOGRAPHY USING MARKUP LANGUAGES AND AES K.Ramesh 1, P.Manivannan 2 1,2 Assistant Professor, Department of Information Technology, V.R.S. College of Engineering & Technology,
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
SteganographyinaVideoConferencingSystem? AndreasWestfeld1andGrittaWolf2 2InstituteforOperatingSystems,DatabasesandComputerNetworks 1InstituteforTheoreticalComputerScience DresdenUniversityofTechnology
An Application of Visual Cryptography To Financial Documents
An Application of Visual Cryptography To Financial Documents L. W. Hawkes, A. Yasinsac, C. Cline Security and Assurance in Information Technology Laboratory Computer Science Department Florida State University
Two-Factor Authentication and Swivel
Two-Factor Authentication and Swivel Abstract This document looks at why the username and password are no longer sufficient for authentication and how the Swivel Secure authentication platform can provide
Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.
Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet
DKIM Enabled Two Factor Authenticated Secure Mail Client
DKIM Enabled Two Factor Authenticated Secure Mail Client Saritha P, Nitty Sarah Alex M.Tech Student[Software Engineering], New Horizon College of Engineering, Bangalore, India Sr. Asst Prof, Department
Image Security System using Encryption and Steganography
Image Security System using Encryption and Steganography Pooja Rani 1, Apoorva Arora 2 P.G. Student, Department of CSE, Chandigarh Engineering College Landran, Mohali, India 1 Associate Professor, Department
International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 Least Significant Bit algorithm for image steganography
Champakamala.B.S, Padmini.K, Radhika.D. K Asst Professors, Department of TCE, Don Bosco Institute of Technology,Bangalore, India Abstract Steganography is one of the most powerful techniques to conceal
Hardware Implementation of Probabilistic State Machine for Word Recognition
IJECT Vo l. 4, Is s u e Sp l - 5, Ju l y - Se p t 2013 ISSN : 2230-7109 (Online) ISSN : 2230-9543 (Print) Hardware Implementation of Probabilistic State Machine for Word Recognition 1 Soorya Asokan, 2
Multi Factor Authentication API
GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach
Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach Gamil R. S. Qaid 1, Sanjay N. Talbar 2 1 Research Student, Electronics & Telecommunications Dept.,S.G.G.S. institute
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
Network Security. Chapter 12. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:
Network Security Chapter 12 Learning Objectives After reading this chapter, you should be able to: Recognize the basic forms of system attacks Recognize the concepts underlying physical protection measures
Towards Securing E-Banking by an Integrated Service Model Utilizing Mobile Confirmation
Research Inventy: International Journal of Engineering And Science Vol.4, Issue 9 (Sept 2014), PP 26-30 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.com Towards Securing E-Banking by an
Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager
Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords Mika Devonshire Associate Product Manager 1 Agenda 2 What is Cybersecurity? Quick overview of the core concepts 3 Cybercrime
Internet Banking Two-Factor Authentication using Smartphones
Internet Banking Two-Factor Authentication using Smartphones Costin Andrei SOARE IT&C Security Master Department of Economic Informatics and Cybernetics Bucharest University of Economic Studies, Romania
Introduction to image coding
Introduction to image coding Image coding aims at reducing amount of data required for image representation, storage or transmission. This is achieved by removing redundant data from an image, i.e. by
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
FFT Algorithms. Chapter 6. Contents 6.1
Chapter 6 FFT Algorithms Contents Efficient computation of the DFT............................................ 6.2 Applications of FFT................................................... 6.6 Computing DFT
JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions
Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai
Friendly Medical Image Sharing Scheme
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer
Ciphermail Gateway PDF Encryption Setup Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway PDF Encryption Setup Guide March 6, 2014, Rev: 5454 Copyright c 2008-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Portal 4 3 PDF encryption
AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
Combating Anti-forensics of Jpeg Compression
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng
