Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Tract & Grid Based Image Authentication


Affiliations
1 Department of Computer Applications Malankara Catholic College, Mariagiri, Kaliyakkavilai, KK Dist, Tamilnadu, India
2 Department of Computer Applications Malankara Catholic College, Mariagiri, Kaliyakkavilai, KK Dist, Tamilnadu, India
     

   Subscribe/Renew Journal


People often choose weak passwords or use the same password for multiple accounts. Such practices can threaten security for not only the individual, but also for the entire website, service or business application. If a hacker is able to access just one user account through weak or stolen credentials, it can quickly escalate to a more widespread security breach. For avoiding this we are developing an easy and intuitive second layer of authentication using sector of images. First level is authenticating with alphanumeric and the second level is authenticating with several facts of an image.

Keywords

Tract Forming, Category Authentication.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 146

PDF Views: 3




  • Tract & Grid Based Image Authentication

Abstract Views: 146  |  PDF Views: 3

Authors

A. R. Sajeev Ambi
Department of Computer Applications Malankara Catholic College, Mariagiri, Kaliyakkavilai, KK Dist, Tamilnadu, India
N. Suresh Singh
Department of Computer Applications Malankara Catholic College, Mariagiri, Kaliyakkavilai, KK Dist, Tamilnadu, India
Shibin J. Raj
Department of Computer Applications Malankara Catholic College, Mariagiri, Kaliyakkavilai, KK Dist, Tamilnadu, India
M. Sreelal
Department of Computer Applications Malankara Catholic College, Mariagiri, Kaliyakkavilai, KK Dist, Tamilnadu, India

Abstract


People often choose weak passwords or use the same password for multiple accounts. Such practices can threaten security for not only the individual, but also for the entire website, service or business application. If a hacker is able to access just one user account through weak or stolen credentials, it can quickly escalate to a more widespread security breach. For avoiding this we are developing an easy and intuitive second layer of authentication using sector of images. First level is authenticating with alphanumeric and the second level is authenticating with several facts of an image.

Keywords


Tract Forming, Category Authentication.