Submit Search
Upload
A Review on Two Level Authentication Using Image Selection and Voice Recognition
•
0 likes
•
21 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i2/IRJET-V4I2241.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 2
Download now
Download to read offline
Recommended
IRJET - Authentication using Image Selection and Voice Recognition
IRJET - Authentication using Image Selection and Voice Recognition
IRJET Journal
Engineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
banda5630
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
IOSR Journals
Secure outsourced attribute based signatures
Secure outsourced attribute based signatures
Adz91 Digital Ads Pvt Ltd
Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical Captcha
Sankar Anand
Contextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor Approach
PortalGuard
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
CSCJournals
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
IAEME Publication
Recommended
IRJET - Authentication using Image Selection and Voice Recognition
IRJET - Authentication using Image Selection and Voice Recognition
IRJET Journal
Engineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
banda5630
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
IOSR Journals
Secure outsourced attribute based signatures
Secure outsourced attribute based signatures
Adz91 Digital Ads Pvt Ltd
Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical Captcha
Sankar Anand
Contextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor Approach
PortalGuard
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
CSCJournals
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
IAEME Publication
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cards
Bayalagmaa Davaanyam
Efficient and secure authentication on remote server using stegno video objec...
Efficient and secure authentication on remote server using stegno video objec...
pradip patel
Update cv khetrabasi new
Update cv khetrabasi new
Khetrabasi Rout
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
IJERA Editor
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
IJECEIAES
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET Journal
Update cv khetrabasi new
Update cv khetrabasi new
Khetrabasi Rout
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
Syed Ubaid Ali Jafri
Iaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authentication
Iaetsd Iaetsd
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
Kailas Patil
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
IRJET Journal
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication Methods
IRJET Journal
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
Generic Authentication System
Generic Authentication System
IRJET Journal
captcha as a graphical password
captcha as a graphical password
VishnuVardhan mooli
otp crid cards
otp crid cards
Bayalagmaa Davaanyam
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key Order
IRJET Journal
Graphical password minor report
Graphical password minor report
Love Kothari
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
IOSR Journals
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
eSAT Journals
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based Method
IRJET Journal
More Related Content
What's hot
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cards
Bayalagmaa Davaanyam
Efficient and secure authentication on remote server using stegno video objec...
Efficient and secure authentication on remote server using stegno video objec...
pradip patel
Update cv khetrabasi new
Update cv khetrabasi new
Khetrabasi Rout
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
IJERA Editor
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
IJECEIAES
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET Journal
Update cv khetrabasi new
Update cv khetrabasi new
Khetrabasi Rout
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
Syed Ubaid Ali Jafri
Iaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authentication
Iaetsd Iaetsd
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
Kailas Patil
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
IRJET Journal
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication Methods
IRJET Journal
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
Generic Authentication System
Generic Authentication System
IRJET Journal
captcha as a graphical password
captcha as a graphical password
VishnuVardhan mooli
otp crid cards
otp crid cards
Bayalagmaa Davaanyam
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key Order
IRJET Journal
Graphical password minor report
Graphical password minor report
Love Kothari
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
IOSR Journals
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
eSAT Journals
What's hot
(20)
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cards
Efficient and secure authentication on remote server using stegno video objec...
Efficient and secure authentication on remote server using stegno video objec...
Update cv khetrabasi new
Update cv khetrabasi new
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
Update cv khetrabasi new
Update cv khetrabasi new
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
Iaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authentication
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication Methods
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
Generic Authentication System
Generic Authentication System
captcha as a graphical password
captcha as a graphical password
otp crid cards
otp crid cards
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key Order
Graphical password minor report
Graphical password minor report
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
Similar to A Review on Two Level Authentication Using Image Selection and Voice Recognition
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based Method
IRJET Journal
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTP
IRJET Journal
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
IRJET Journal
IRJET- Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
IRJET Journal
Enhanced Security Through Token
Enhanced Security Through Token
IRJET Journal
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
IRJET Journal
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET Journal
IRJET- Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODE
IRJET Journal
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
IRJET Journal
Vshantaram
Vshantaram
sparsh dwivedi
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
IRJET Journal
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET Journal
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate System
IRJET Journal
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
IRJET Journal
Image Forgery / Tampering Detection Using Deep Learning and Cloud
Image Forgery / Tampering Detection Using Deep Learning and Cloud
IRJET Journal
IRJET - Android Application Service Call Management System
IRJET - Android Application Service Call Management System
IRJET Journal
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
IRJET Journal
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET Journal
Similar to A Review on Two Level Authentication Using Image Selection and Voice Recognition
(20)
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based Method
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTP
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
IRJET- Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
Enhanced Security Through Token
Enhanced Security Through Token
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET- Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODE
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
Vshantaram
Vshantaram
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate System
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
Image Forgery / Tampering Detection Using Deep Learning and Cloud
Image Forgery / Tampering Detection Using Deep Learning and Cloud
IRJET - Android Application Service Call Management System
IRJET - Android Application Service Call Management System
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
AbhinavSharma374939
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Recently uploaded
(20)
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
A Review on Two Level Authentication Using Image Selection and Voice Recognition
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1237 A Review on Two Level Authentication Using Image Selection and Voice Recognition Priyanka Raut1, Shubhangi Kolte2, Swati Pachare3 Prof. Ashwin Shinde4 123 UG Students, B.E., Computer Science and Engineering, DBACER, Nagpur, Maharashtra, India 4Assistant Professor, B.E., Computer Science and Engineering, DBACER, Nagpur, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - This thought presents another development in the field of information security that is an application with picture based confirmation and voice based verification and these both will go about as qualification. The picture based watchword inserting with noticeable watermark and discourse acknowledgment for desktop application helps in accomplishing abnormal state of security than the basic alphanumeric secret key and in the meantime more simpleto- utilize. Key Words: Security, Verification, Watermark 1. INTRODUCTION Confirmation assumes an imperative part in ensuringassets against unapproved utilize. Numerousvalidationformsexist from basic secret key based verification framework to exorbitant biometric confirmation frameworks. So while expanding security is an issue content based passwords are insufficient to handle such issues. The requirement for something more secure alongside being easy to use is required. The procedure of approval canbeaccomplished by utilizing certification, however these days qualification can be effortlessly gotten to and the data is more powerless against such assault. Animal compel assault and there are numerous product accessible which can help in speculating the accreditation. The alphanumeric watchword can be speculated effortlessly by checking the predefined design in this way verification in view of content basedpasswords has significant downsides. More refined confirmation process is expensive and may require extra gear or equipment.Tobeat such disadvantages we built up a framework for check of individual character utilizing C# ASP.NET. In the proposed framework, picture based verification and voice based confirmation can give abnormal state of security and will go about as accreditation. The picture based watchword installed with watermark and Speech Recognition for desktop application helps in accomplishing abnormal state of security than the basic alphanumeric secret keyandinthe meantime simpler to-utilize. [1][2] 2. RELATED WORK 2.1Password based authentication system This is a straightforward framework where a client displays a client ID and a secret word to the framework. On the off chance that the client ID and secret key match with the one put away on the framework, then the client is verified. A client may have many records on numerousPCs.Heneeds to recollect numerous passwords. Examine on human subjective capacity has produced a considerable measure of information on what an individual can recall [1]. For instance, space names are utilized rather than IP addresses and phone numbers are softened up to lumps for a personto recall effectively. It is additionally demonstratedthatpeople can recall pictures more effortlessly than the content. The general propensity is that an individual may not recall content passwords effortlessly and he may record it. This can prompt to taking watchword to increase unapproved access to a framework. Since passwords can't be long, they are anything but difficult to break utilizing savage constrain assaults like endeavoring distinctive passwords (online assault) or by disconnected assault on the secret key hash record. There are numerous different approaches to break passwords like parcel sniffing, by unplanned disclosure. Arrange activity is anything but difficult to catch and investigate utilizing the instruments accessible in the web. Organize convention analyzers, forexample,Ethereal Packet Sniffer and tcp dump can be utilized to gather both approaching and active system information including Content based passwords. [1] 2.1 Biometric based authentication system Biometrics, the utilization of factual examination to distinguish people through their natural or physiological qualities, is developing as a key viewpoint in new security frameworks. Utilizing biometrics, it is conceivable to dodge pitfalls experienced with conventional security frameworks where clients are required to keep data, for example, passwords, safe. Biometric validation frameworks might be extremely sheltered and secure and solid however these frameworks are exorbitant and require extra equipment and programmingsupport.Theseframeworksarehardtochange and keep up. Sending such frameworks for web might be extremely mind boggling and not reasonable. [1]
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1238 3. PROPOSED WORK 3.1 MODULES Registration: Another client should finish the enrollment procedure by filling the fundamental data. In this module client need to give fundamental data and all the data is put away in the database. The data will contain subtle elements as username, client id, watchword, versatile number, email id and watermark. The client distinguishing proof should be exceptional and will go about as essential key amid enrollment prepare. The watermark will go about as a special code which when inserted with chose picture will give us more level of security. On the off chance that he/she is as of now enrolled then they ought to login for further process. Image based credential generation In this module, client need to choose one picture and enter a watermark and should be installed keeping in mind the end goal to separate the picture, and this picture will be exceptional in view of the watermark which was implanted in the picture. Here watermark will be noticeable and as numeric and letters in order. Accordingly the new produced pictures utilizing watermark will go about as first level of certification era. Voice based credential generation In this module, client needs to give the voice summon and which will go about as second level of qualification generation.Asp.net give us an instrument to perceive discourse. The System.Speech.Recognition namespace contains window desktop discourse innovation sorts for actualizing discourse recognition.SetupSpeech.ToText() is capacity that calls the correct technique to change over discourse to content .Thus this will be our voice charge for validation. Image based authentication In this module, client needs to choose the required picture with a specific end goal to accomplish first level of confirmation. On the off chance that the clientgivesrequired qualification then just can move to second level of verification. Voice based authentication In this module, client needs to give the requiredvoicecharge with a specific end goal to accomplish second level of confirmation. In the event that the client gives required accreditation then just can get to further process. 4. FLOW DIAGRAM 4. CONCLUSION This paper introduces a picture and voice confirmation plot as another option to supplant content based verification framework. The two level of validation gives heartier framework when contrasted with alphanumericverification prepares. Picture based validation utilizing watermark method makes picture based confirmation more solid. Different applications can be shielded from differentsorts of assault and the data can be secured. REFERENCES [1] Srinath Akula and Veerabhadram Devisetty “Image Based Registration and Authentication System,” Department of Computer Science St cloud State University, St. Cloud, MN 56301 [2] Manish Kumar and Prof (Dr.) Jayant Shekhar “A Study of Implementation of Image Based Authentication System,”Subharti Institute of Technology and Engineering, Meerut, India Volume 4, Issue 4, April 2014. [3] Prof.ShivashankarM.RampurandMiss.Kavita S.Rampur, “An Approach of SpeechRecognitionSystemforDesktop Application,”Volume 5 Issue 12 Dec. 2016, Page No. 19471-19475
Download now