Open Access Subscription or Fee Access
Tract & Grid Based Image Authentication
People often choose weak passwords or use the same password for multiple accounts. Such practices can threaten security for not only the individual, but also for the entire website, service or business application. If a hacker is able to access just one user account through weak or stolen credentials, it can quickly escalate to a more widespread security breach. For avoiding this we are developing an easy and intuitive second layer of authentication using sector of images. First level is authenticating with alphanumeric and the second level is authenticating with several facts of an image.
Tract Forming, Category Authentication
Lee Jackson,Analysis of Image-Based Authentication and its Role in Security Systems of the Future, Lee Jackson 05013035 BEng (Honours) Internet Computing.
Srinath Akula, Veerabhadram Devisetty, Image Based Registration and Authentication System.
Tetsuji TAKADA1 and Hideki KOIKE2, Awase-E: Image-based Authentication for Mobile Phones using User‟s Favorite Images.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.