Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2017
Proposed system introduces a numeric OTP (one time password) based authentication system where a secured value extracted from user private information(user id, password and security questions) and unique biometric image directed by the OTP is used for authentication rather than using the direct OTP value. Server randomly selects the position of character and number of block of pixels from randomly selected modified private information of user and user biometric images. Finally we combine those positions and block number of pixel and generate intermediate OTP. Final OTP will be generated from intermediate OTP using digit repositioning scheme which will be shared to user. User extracted and formulates secured values from private information and biometric image directed by the numeric value of intermediate OTP. That secured value is used for authentication. Random selection of characters and pixels from randomly selected user information and biometric image, distribution of OTPs in mul...
By definition, Authentication is using one or multiple mechanisms to show that you are who you claim to be. As soon as the identity of the human or machine is demonstrated, then human or machine is authorized to grant some services. The modern research study reveals that fingerprint is not so secured like secured a password which consists of alphanumeric characters, number and special characters. Fingerprints are left at crime places, on materials or at the door which is usually class of latent fingerprints. We cannot keep fingerprint as secure like rigid passwords. Using some modern technology with copper and graphite spray it's easy to mimic fingerprint image. Fingerprints are a half-secret if passwords are leaked or hacked, it easily revocable using another password. But in a biometric security system, which uses only biometric features, is not easy to change fingerprint key or fingerprint are static biometric, which never change much throughout the lifespan. Fingerprints are left at car, door or anyplace where every person goes and places his finger. Fingerprint Hash code is not used for full security or authentication purpose but it can be combined with other security elements like password or OTP in order to enhance security. In this paper, a novel method for Authentication is proposed by making use of Fingerprint Hash Code, Password, and OTP. In this study, we make use of Euclidean Distance to generate fingerprint Hash Code. Fingerprint Hash code is generated using MD5 Hash Function. The Model is implemented using MATLAB2015a. This paper also analyzes novel Authentication model used in this study with the aid of ABCD analysis.
Authentication is the process to validate the user identity and to grant some resources or services to the user. Authentication process uses many factors like password, biometrics, or One Time Password. Multifactor authentication model always gives higher security than single-factor authentication model. Fingerprint Hash code is not used for full security or authentication purpose but it can be combined with other security elements like password or OTP in order to enhance security. Fingerprint Hash code acts as a key, which can uniquely identify every person. So it can be replaceable with user-id or username and can work along with text-based or picture based or pattern based passwords. In this paper based on focus group interaction, first, we define an Ideal Authentication System. The Ideal Authentication System used in this study consists of different components like Ideal Security, Ideal User-Friendly, Ideal Input, Ideal Process, and Ideal Performance Evaluation Matrices. In this paper, we also compare new Multifactor Authentication Model based on Fingerprint Hash code, OTP, and Password with existing authentication systems. The traditional user-id, password-based internet/mobile banking system, Apple iPhone X face recognition system, HDFC OTP Checkout for online transactions and Indian Aadhaar card registration process are the different existing systems used in this study to compare with the new model.
2019 •
The growth of online application used for financial transactions and transferring personal information is increasingly common on internet and in mobile communication. These applications require authenticating legitimate users by assigning digital identities. Static passwords are perhaps most common type of credentials used today to authenticate the users. To avoid tedious task of remembering passwords, users often behave less securely by using low entropy and weak passwords, thus presenting security threats to online services. Various solutions have been provided to eliminate the need of users to create and manage passwords’ typical solution is based on generating one time password (OTP) for a single session or transaction. Unfortunately in most of the general mechanisms used for generating one time password (OTP) randomness of OTP system breaks after certain period of time and hence passwords become predictable. To solve this problem, in this paper a novel OTP generation method has...
Ijca Proceedings on International Conference on Communication Technology
Image based Authentication System2013 •
Abstract- Nowadays most of e-commerce sites, networks and online communities require only a user name and static password for login and access to personal and sensitive data, where the login with such credentials is known as one factor authentication, as the user is required to know only one thing to get accessed. Although this one-factor authentication method is convenient, it is not secure because of online identity thefts, where users are targeted by miscreants, besides they face some attacks like eavesdropping, phishing attack, spoofing, man in the middle attack, replay attacks, denial of services and virus attacks, these attacks are increasing throughout the world [1]. Therefore, this paper presents a two-factor authentication method where an additional security credential is added to address the limitations of static passwords (one-factor authentication). This paper proposes a model of Random Image Based Password Authentication (RIBPA) to generate an image-based One-time password (OTP) which is a password that is valid for only one login session or transaction within certain period of time and is created by using images. The proposed model requires the user to log in first with his credentials (user name & password), then he/she has to use his/her additional security credential, which is the generated image-based OTP to complete his/her authentication process. The OTP is generated by using three random images uploaded by the user at each time he/she logs in. The time of the OTP generation is 3 seconds which is a great achievement compared to other proposed models, and it will be valid for only one login session or transaction, and expired after 60 seconds. The proposed model is developed using MATLAB, and was tested on HP G72 Notebook PC under Windows 8 operating system.
KMUTNB International Journal of Applied Science and Technology
Improving Security with Two-factor Authentication Using Image2015 •
Journal of Physics: Conference Series
A Secured One Time Password Authentication Technique using (3, 3) Visual Cryptography Scheme2019 •
The world is vastly becoming a completely digital one with most transactions carried out over the internet. This has exposed the internet to increasing threats and attacks and has necessitated the need for an internet-based authentication and authorization services. One Time Passwords (OTP) have been introduced to overcome the limitations of static passwords. However, research has shown that OTP are not completely free from middle man attacks. This paper presents a (3, 3) Visual Cryptographic Scheme (VCS) technique for OTP security. The technique secures the generated OTP image by dividing it into three shares, of which one of the shares will be sent to the user while the remaining shares will be stored at different locations on the server. Before the original OTP image will be recovered, all the shares must the retrieved and stacked together. To avoid pixel expansion problem and loss of image quality that have characterized existing VCS technique, progressive visual cryptography wa...
2020 •
Online banking is the effective means of money transfer. The online banking service helps the customers to carry out the bank activities easily. The more the security is improved, the more customers are retained. With the expansion of internet banking, a lot of security threats like hacking, viruses, grooming, phishing, spam, etc. are increasing. We tackle them by making improvements in security measures. The Secure Electronic Transaction using Strengthened Graphical OTP Authentication service requires user's security image, security pattern and security questions to be registered in the bank. The user authentication is done by verifying the security images in addition to username and password where only two wrong attempts are allowed for a day. We propose multi-level security in transactions by using Face recognition technique for the devices with webcam, Graphical OTP authentication for the devices without webcam and security questions verification along with OTP. We make use of fortified GrIDsure technique that uses secret Grid Transmission for user authentication which helps to make fully Secure Electronic Transaction
Biochemical Pharmacology
Carcinogenic and anticarcinogenic substances and nucleic acid constituents: their interaction mechanism by raman, IR, and NMR spectroscopy1988 •
Experimental Cell Research
Testosterone-Induced Growth of S115 Mouse Mammary Tumor Cells Is Dependent on Heparan Sulfate2001 •
2019 •
Journal of Advanced Civil and Environmental Engineering
Flexural Behaviors of Precast Reinforced Concrete -EPSfoam-Steel Deck Hybrid PanelAdvances in Science and Technology
Rheology of Ceramic Suspensions with Biopolymeric Gelling Additives2006 •
2019 •
Journal of visualized experiments : JoVE
Cerebral blood oxygenation measurement based on oxygen-dependent quenching of phosphorescence2011 •
Studies in Art Education: A Journal of Issues and Research in Art Education
Becoming a Researcher in Art Education: Establishing Research Goals2003 •
The Journal of pediatrics
Neurocognitive Outcomes at 10 Years of Age in Extremely Preterm Newborns with Late-Onset Bacteremia2017 •
Histoire Sociale-social History
A choke of emotion, a great heart-leap": English-Canadian Tourists in Britain, 1880s-19142006 •