SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1816
E AUTHENICATION SYSTEM USING QR CODE AND OTP
B. Anand1, M. Kalpana2, Dr. V. Srinivasan3
1Student, Department of computer Applications, Madanapalle institute of technology and science, India
2Student, Department of computer Applications, Madanapalle institute of technology and science, India
3Sr. Asst. Professor, Department of computer Applications, Madanapalle institute of technology and science, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Inside the proposed plan, the client can without
such an inconceivable system a stretch and essentially login
into the methodology. We look at the interest and solace of
the proposed plan and uncover the check of the proposed
plan to the hacking of login limits, shoulder surveying and
accidental login. The shoulder riding attack may moreover
be performed by the adversary to add up to the buyer's
unprecedented explanation by truly zeroing in on the
client's shoulder as he enters his mystery key. Since we have
made a safeguarded system plans with a ton of levels of
safety from shoulder watching out for were proposed. Quick
Response (QR) codes can set this. QR Code is the brand name
for the two-layered standardized conspicuous truly explore
structure. The incredibly isolating square is on everything
from upgrades to stock. In "e-Authentication utilizing QR
Code" we are giving secure login by the QR code and email
confirmations. It very well may be executes the best security
for clients login. As a fast web structure is being made and
people are informationized, even the cash related tries are
busy with web field. In PC sorting out, hacking is a
particular work to control the normal lead of framework
affiliations and related structures. The predictable web
banking structure had a lot of contribution in the bet of
hacking and its outcome which couldn't be pardoned. Of
late, the single information has been spilled by a serious
level framework, for instance, Phishing or Pharming past
getting a client's ID and Password. Therefore, a remained
mindful of client support structure gets totally more key and
major. At this moment, propose another Online Banking
Authentication structure. This deals structure used Mobile
OTP with the blend of QR-code which is a method of the 2D
normalized clear check.
Key words: E-Authentication, QR code, OTP, secret
pathway, secure exchange, security
1.INTRODUCTION
Inside the proposed plan, the client can without such a
critical system a stretch and profoundly login into the new
development. We look at the demand and solace of the
proposed plan and uncover the check of the proposed plan
to the hacking of login limits, shoulder checking out and
unconstrained login. The shoulder riding attack may
correspondingly be performed by the adversary to add up
to the buyer's confounding explanation by really focusing
in on the client's shoulder as he enters his mystery key.
Since we have made a protected development plans with a
ton of levels of safety from shoulder examining were
proposed. To utilize this check structure, the client needs
to begin to pick himself into this system by recording up
till the central certification nuances. After a solid
confirmation, the client can get to the login module, the
spot he/she should, near the start, support the record with
the embellishment of entering the email character and
mystery word which was once planned while
determination. Web banking called web, in general,
banking, is an electronic piece structure that attracts
clients of a bank or other cash related establishment to
lead a level of cash related trades through the financial
foundation's page. The electronic monetary system will
constantly talk with or be a piece of the middle cash
related structure worked by a bank and is rather than
branch banking which was the standard way clients got to
banking affiliations. A couple of banks fill in as a "rapid
bank" (or "virtual bank"), where they rely absolutely on
web banking. Web banking programming gives individual
and corporate cash related affiliations offering features,
for instance, seeing record changes, getting orders,
checking reliable trade and making areas which is truly
trustworthy. Access is by and large talking through a
protected website page using a username and secret key,
yet security is a fundamental idea in web banking and
various banks other than offer two-piece affirmation using
a (security token).
Literature Review
Writing is the main move toward programming
improvement process. Prior to fostering the apparatus, it is
important to decide the time factor, economy n
organization strength. When these things r fulfilled, ten
following stages are to figure out which working
framework and language can be utilized for fostering the
apparatus. When the software engineers begin
constructing the device the developers need part of outer
help. This help can be acquired from senior software
engineers, from book or from sites. Prior to building the
framework the above thought is considered for fostering
the proposed framework.
• Skillet R and Zhang K., made sense of the Discuss
of Rational and Irrational Design of Needs Hierarchy in
Product Design. In this paper, they examine a portion of the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1817
advances accessible for protein overhaul and show these
with models from the bio-catalysis, biosensor, and helpful
fields.
• Erevelles et al., proposed a model of "An
interpretation way to deal with compact ontologies". This
is accomplished through the idea of "data content
incorporation connection", IIR for short. We present what
an IIR is, and the way that IIR can be distinguished from
both a philosophy and a data set, and afterward thinking
about them.
• Zhang N and G Xiaokang., examined a model of
"Reexamination of the worth of handiworks in the post-
modern time". The motivation behind our examination is to
figure out the variables that impact the Swedish
customers‟ buy choice of hand tailored makes.
Consequently, this study was finished in Sweden.
• S Yuvalatha and V Sumathi., proposed a model of
"Programmed Merging of area explicit metaphysics". In the
proposed approach the area explicit worldwide philosophy
is Created by estimating the lexical, semantic and to
distinguish homonyms struggle utilizing set of SWRL rule
in information base. The comparable classes and occasion
are joined as a solitary cosmology.
2.Proposed System
When the client chooses the verification type as QR
Code, then, at that point, framework will produce a QR
code and send it client's mail id over web. On the off
chance that client chooses OTP, SMS will be sent on
his/her enlisted portable number. On the off chance that
the client passes the validation, framework will redirect to
the fundamental page. The QR Code and OTP are
arbitrarily produced by the framework at the season of
login. Security is one of the main parts for necessities of
the validation framework. Unmistakable verification
through a safeguarded system where simply true client
should bring the choice to the table for kinds of help, when
they get endorsement from the waiter using the made
information from the client's phone. Moreover,
convenience is critical similarly as prosperity since weight
of the confirmation framework has possible to use the
system. As such, the validation framework should give
convenience most outrageous security. Thusly, a huge
system proposed in this paper is correct now being used
to deliver a QR-code as opposed to use to security card
from the bank and use the portable OTP. The bank makes
the QR-code using entered by client's exchange
information and the client needs to see as to scrutinize the
code using their wireless and produce the OTP code using
move information and the hashed client's cell successive.
3. Related work
A. OTP (One-time password)
An OTP is a made mystery word which simply
significant once. It is a consequently delivered numeric or
alphanumeric series of characters that approves the client
for a solitary exchange or login meeting. OTP security
tokens are chip based savvy cards or pocket-size key
dandies that produce a numeric or alphanumeric code to
affirm admittance to the structure or string. This mystery
code changes every 30 or 60 seconds, dependent upon how
the token is planned. The client is given a device that can
make an OTP using a calculation and cryptographic keys.
On the server side, an affirmation server can really look at
the authenticity of the mystery key by having a comparable
calculation and keys. In OTP-based approval procedures,
the client's OTP application and the confirmation server
rely upon shared insider realities. Characteristics for one-
time passwords are delivered using the Hashed Message
Authentication Code (HMAC) calculation and a moving
component, for instance, time touchy information (TOTP)
or an event counter (HOTP). The OTP values have second
or second timestamps for more noticeable security. The
one-time secret expression can be passed on to a client
through a couple of channels, including a SMS-based text,
an email or a serious application on the endpoint.
B. QR CODE:
A QR Code is a Matrix code and a two-layered standardized
identification made by the Japanese affiliation Denso Wave.
Data is encoded in both the vertical and flat course, thusly
holding up to a couple on numerous occasions a larger
number of information than an ordinary standardized
identification. Information is gotten to by getting a photo of
the code by using a camera (for instance combined with a
cell phone) and dealing with the picture with a QR peruse.
This development has been around for longer than 10
years yet has become as a vehicle for backers to show up at
cutting edge cell phone clients. Quick Response Codes, or
QR Codes, are just old news new. Truth to be told, in Japan
and Europe they have been utilized as a piece of advancing
and moreover stock control what's more, storing up all
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1818
through the beyond 10 years. The security of one layered
(1D) standardized identification is lower than 2D scanner
tags. 1D standardized identifications are certainly not hard
to examine by separating the lines and the spaces.
Regardless, 2D scanner tags are difficult to examine an
image plan by natural eyes. As to weightiness, one layered
standardized identifications should yield along a solitary
heading. On the off chance that the reason for a sweep line
doesn't fit inside a reach, the information wouldn't be
examined precisely. In any case, 2D standardized tags get
wide extent of plot for examining. The critical
differentiation between the two is the extent of information
they can hold or share. Scanner labels are straight one-
layered codes and can essentially hold up to 20
mathematical digits, but QR codes are two-layered (2D)
lattice standardized tags that can hold 7,089 numeric
characters and 4,296 alphanumeric characters, and 1,817
kanji.
TABLE
4.CONCLUSIONS
REFERENCES
1. Pan Rong and Zhang Kefang, "Discuss of Rational and
Irrational Design of Needs Hierarchy in Product
Design", Packing Engineering, vol. 29, pp. 115-117,
2008.
2. T. R. Gruber, "A translation approach to portable
ontologies", Knowledge Acquisition, vol. 5, no. 2, pp.
199-220, 1993.
3. S. Yuvalatha and V.P. Sumathi, "Automatic Merging of
domain specific ontology", In International Journal of
Revolution in Electrical and Electronic Engineering
(IJREEE), vol. 1, no. 1, Aug 2014.
4. Zhang Na and Gao Xiaokang, "Reevaluation of the
value of handicrafts in the post-industrial era [J]",
Learning and Practice, vol. 01, pp. 126-132, 2017.
5. Pan Rong and Zhang Kefang, "Discuss of Rational and
Irrational Design of Needs Hierarchy in Product
Design", Packing Engineering, vol. 29, pp. 115-117,
2008.
6. T. R. Gruber, "A translation approach to portable
ontologies", Knowledge Acquisition, vol. 5, no. 2, pp.
199-220, 1993.
7. S. Yuvalatha and V.P. Sumathi, "Automatic Merging of
domain specific ontology", In International Journal of
Revolution in Electrical and Electronic Engineering
(IJREEE), vol. 1, no. 1, Aug 2014.
8. Zhang Na and Gao Xiaokang, "Reevaluation of the
value of handicrafts in the post-industrial era [J]",
Learning and Practice, vol. 01, pp. 126-132, 2017.
The endeavor has inspected that we have encouraged a
simple to utilize application which is solid for the clients
(clients) as well as clients (carriers). The client can visit
securely from the conveyed QR code OTP and can happen
with their shopping by visit the shops to buy clothing,
embellishments, staple and electronic etc..,.Through online
by using this application.it is surely clear and focal work to
do shopping with any virtual visits to the shops. In this
application the client can see the decisions like foot wear,
lights, wooden things, moving things and essentially
amassed makes, later the client can pick what to buy and
the client can add what to truck to hence buy. After client
verification of things the client can see the things requests
and the client can see or drop the procedures then, at that
point, in case the client can see the suggesting interest the
client can follow the plans status like clear, legitimized,
squashed and drop. Client can pick the cash down decision
to pay for his/her purchasing thing.
9. http://ajast.net/data/uploads/4ajast-9.pdf
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1819
10.
http://ijesc.org/upload/15de67d580745fa9233dd99
06e322d67.QR%20Code%20Security%20and%20Sol
uti on.pdf
11.
http://academicscience.co.in/admin/resources/proje
c t/paper/f201405051399309076.pdf
12.
https://searchsecurity.techtarget.com/definition/one
time-password-OTP
13. https://connect.cognex.com/India-Cognex-
IndustrialBarcode-Readers-LP?src=0ebcb667-3333-
e911-9137- 00505693004d&cm_campid=0ebcb667-
3333-e91
14. Mohammad Mannan and P. C. Van Oorschot, "Security
and Usability: The Gap in Real-World Online Banking"
in NSPW'07 North Conway, NH, USA, pp. 18-21, Sep.
2007.
15. Phishing Activity Trends Report, Dec. 2008.
16. Sang-Il Cho, HoonJae Lee, Hyo-Taek Lim and Sang-Gon
Lee, OTP Authentication Protocol Using Stream Cipher
with Clock-Counter, October 2009.
17. Jean-Daniel Aussel, "Smart Cards and Digital Identity",
Telektronikk, vol. 3, no. 4, 2007.
18. HOTP: An HMAC-Based One-Time Password
Algorithm, Dec. 2005.

More Related Content

Similar to E AUTHENICATION SYSTEM USING QR CODE AND OTP

E Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPE Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPijtsrd
 
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.IRJET Journal
 
KYC VERIFICATION USING BLOCKCHAIN
KYC VERIFICATION USING BLOCKCHAINKYC VERIFICATION USING BLOCKCHAIN
KYC VERIFICATION USING BLOCKCHAINIRJET Journal
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking SecurityIRJET Journal
 
Application on Know Your Customer Authentication
Application on Know Your Customer AuthenticationApplication on Know Your Customer Authentication
Application on Know Your Customer AuthenticationIRJET Journal
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET Journal
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...ijiert bestjournal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)IJNSA Journal
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)IJNSA Journal
 
Digital Certificate Verification using Blockchain
Digital Certificate Verification using BlockchainDigital Certificate Verification using Blockchain
Digital Certificate Verification using BlockchainIRJET Journal
 
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET Journal
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordIOSR Journals
 
Optical Character Recognition based KYC System
Optical Character Recognition based KYC SystemOptical Character Recognition based KYC System
Optical Character Recognition based KYC SystemIRJET Journal
 
A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionA Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionIRJET Journal
 
A Survey on e-KYC Verifier Using Blockchain
A Survey on e-KYC Verifier Using BlockchainA Survey on e-KYC Verifier Using Blockchain
A Survey on e-KYC Verifier Using BlockchainIRJET Journal
 
Product Anticounterfeiting in Supply Chain Using Blockchain Technology
Product Anticounterfeiting in Supply Chain Using Blockchain TechnologyProduct Anticounterfeiting in Supply Chain Using Blockchain Technology
Product Anticounterfeiting in Supply Chain Using Blockchain TechnologyIRJET Journal
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...IRJET Journal
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODEIRJET Journal
 

Similar to E AUTHENICATION SYSTEM USING QR CODE AND OTP (20)

E Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPE Authentication System with QR Code and OTP
E Authentication System with QR Code and OTP
 
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
 
KYC VERIFICATION USING BLOCKCHAIN
KYC VERIFICATION USING BLOCKCHAINKYC VERIFICATION USING BLOCKCHAIN
KYC VERIFICATION USING BLOCKCHAIN
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
 
Application on Know Your Customer Authentication
Application on Know Your Customer AuthenticationApplication on Know Your Customer Authentication
Application on Know Your Customer Authentication
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
 
Digital Certificate Verification using Blockchain
Digital Certificate Verification using BlockchainDigital Certificate Verification using Blockchain
Digital Certificate Verification using Blockchain
 
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
Optical Character Recognition based KYC System
Optical Character Recognition based KYC SystemOptical Character Recognition based KYC System
Optical Character Recognition based KYC System
 
A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionA Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice Recognition
 
A Survey on e-KYC Verifier Using Blockchain
A Survey on e-KYC Verifier Using BlockchainA Survey on e-KYC Verifier Using Blockchain
A Survey on e-KYC Verifier Using Blockchain
 
Product Anticounterfeiting in Supply Chain Using Blockchain Technology
Product Anticounterfeiting in Supply Chain Using Blockchain TechnologyProduct Anticounterfeiting in Supply Chain Using Blockchain Technology
Product Anticounterfeiting in Supply Chain Using Blockchain Technology
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODE
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 

E AUTHENICATION SYSTEM USING QR CODE AND OTP

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1816 E AUTHENICATION SYSTEM USING QR CODE AND OTP B. Anand1, M. Kalpana2, Dr. V. Srinivasan3 1Student, Department of computer Applications, Madanapalle institute of technology and science, India 2Student, Department of computer Applications, Madanapalle institute of technology and science, India 3Sr. Asst. Professor, Department of computer Applications, Madanapalle institute of technology and science, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Inside the proposed plan, the client can without such an inconceivable system a stretch and essentially login into the methodology. We look at the interest and solace of the proposed plan and uncover the check of the proposed plan to the hacking of login limits, shoulder surveying and accidental login. The shoulder riding attack may moreover be performed by the adversary to add up to the buyer's unprecedented explanation by truly zeroing in on the client's shoulder as he enters his mystery key. Since we have made a safeguarded system plans with a ton of levels of safety from shoulder watching out for were proposed. Quick Response (QR) codes can set this. QR Code is the brand name for the two-layered standardized conspicuous truly explore structure. The incredibly isolating square is on everything from upgrades to stock. In "e-Authentication utilizing QR Code" we are giving secure login by the QR code and email confirmations. It very well may be executes the best security for clients login. As a fast web structure is being made and people are informationized, even the cash related tries are busy with web field. In PC sorting out, hacking is a particular work to control the normal lead of framework affiliations and related structures. The predictable web banking structure had a lot of contribution in the bet of hacking and its outcome which couldn't be pardoned. Of late, the single information has been spilled by a serious level framework, for instance, Phishing or Pharming past getting a client's ID and Password. Therefore, a remained mindful of client support structure gets totally more key and major. At this moment, propose another Online Banking Authentication structure. This deals structure used Mobile OTP with the blend of QR-code which is a method of the 2D normalized clear check. Key words: E-Authentication, QR code, OTP, secret pathway, secure exchange, security 1.INTRODUCTION Inside the proposed plan, the client can without such a critical system a stretch and profoundly login into the new development. We look at the demand and solace of the proposed plan and uncover the check of the proposed plan to the hacking of login limits, shoulder checking out and unconstrained login. The shoulder riding attack may correspondingly be performed by the adversary to add up to the buyer's confounding explanation by really focusing in on the client's shoulder as he enters his mystery key. Since we have made a protected development plans with a ton of levels of safety from shoulder examining were proposed. To utilize this check structure, the client needs to begin to pick himself into this system by recording up till the central certification nuances. After a solid confirmation, the client can get to the login module, the spot he/she should, near the start, support the record with the embellishment of entering the email character and mystery word which was once planned while determination. Web banking called web, in general, banking, is an electronic piece structure that attracts clients of a bank or other cash related establishment to lead a level of cash related trades through the financial foundation's page. The electronic monetary system will constantly talk with or be a piece of the middle cash related structure worked by a bank and is rather than branch banking which was the standard way clients got to banking affiliations. A couple of banks fill in as a "rapid bank" (or "virtual bank"), where they rely absolutely on web banking. Web banking programming gives individual and corporate cash related affiliations offering features, for instance, seeing record changes, getting orders, checking reliable trade and making areas which is truly trustworthy. Access is by and large talking through a protected website page using a username and secret key, yet security is a fundamental idea in web banking and various banks other than offer two-piece affirmation using a (security token). Literature Review Writing is the main move toward programming improvement process. Prior to fostering the apparatus, it is important to decide the time factor, economy n organization strength. When these things r fulfilled, ten following stages are to figure out which working framework and language can be utilized for fostering the apparatus. When the software engineers begin constructing the device the developers need part of outer help. This help can be acquired from senior software engineers, from book or from sites. Prior to building the framework the above thought is considered for fostering the proposed framework. • Skillet R and Zhang K., made sense of the Discuss of Rational and Irrational Design of Needs Hierarchy in Product Design. In this paper, they examine a portion of the
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1817 advances accessible for protein overhaul and show these with models from the bio-catalysis, biosensor, and helpful fields. • Erevelles et al., proposed a model of "An interpretation way to deal with compact ontologies". This is accomplished through the idea of "data content incorporation connection", IIR for short. We present what an IIR is, and the way that IIR can be distinguished from both a philosophy and a data set, and afterward thinking about them. • Zhang N and G Xiaokang., examined a model of "Reexamination of the worth of handiworks in the post- modern time". The motivation behind our examination is to figure out the variables that impact the Swedish customers‟ buy choice of hand tailored makes. Consequently, this study was finished in Sweden. • S Yuvalatha and V Sumathi., proposed a model of "Programmed Merging of area explicit metaphysics". In the proposed approach the area explicit worldwide philosophy is Created by estimating the lexical, semantic and to distinguish homonyms struggle utilizing set of SWRL rule in information base. The comparable classes and occasion are joined as a solitary cosmology. 2.Proposed System When the client chooses the verification type as QR Code, then, at that point, framework will produce a QR code and send it client's mail id over web. On the off chance that client chooses OTP, SMS will be sent on his/her enlisted portable number. On the off chance that the client passes the validation, framework will redirect to the fundamental page. The QR Code and OTP are arbitrarily produced by the framework at the season of login. Security is one of the main parts for necessities of the validation framework. Unmistakable verification through a safeguarded system where simply true client should bring the choice to the table for kinds of help, when they get endorsement from the waiter using the made information from the client's phone. Moreover, convenience is critical similarly as prosperity since weight of the confirmation framework has possible to use the system. As such, the validation framework should give convenience most outrageous security. Thusly, a huge system proposed in this paper is correct now being used to deliver a QR-code as opposed to use to security card from the bank and use the portable OTP. The bank makes the QR-code using entered by client's exchange information and the client needs to see as to scrutinize the code using their wireless and produce the OTP code using move information and the hashed client's cell successive. 3. Related work A. OTP (One-time password) An OTP is a made mystery word which simply significant once. It is a consequently delivered numeric or alphanumeric series of characters that approves the client for a solitary exchange or login meeting. OTP security tokens are chip based savvy cards or pocket-size key dandies that produce a numeric or alphanumeric code to affirm admittance to the structure or string. This mystery code changes every 30 or 60 seconds, dependent upon how the token is planned. The client is given a device that can make an OTP using a calculation and cryptographic keys. On the server side, an affirmation server can really look at the authenticity of the mystery key by having a comparable calculation and keys. In OTP-based approval procedures, the client's OTP application and the confirmation server rely upon shared insider realities. Characteristics for one- time passwords are delivered using the Hashed Message Authentication Code (HMAC) calculation and a moving component, for instance, time touchy information (TOTP) or an event counter (HOTP). The OTP values have second or second timestamps for more noticeable security. The one-time secret expression can be passed on to a client through a couple of channels, including a SMS-based text, an email or a serious application on the endpoint. B. QR CODE: A QR Code is a Matrix code and a two-layered standardized identification made by the Japanese affiliation Denso Wave. Data is encoded in both the vertical and flat course, thusly holding up to a couple on numerous occasions a larger number of information than an ordinary standardized identification. Information is gotten to by getting a photo of the code by using a camera (for instance combined with a cell phone) and dealing with the picture with a QR peruse. This development has been around for longer than 10 years yet has become as a vehicle for backers to show up at cutting edge cell phone clients. Quick Response Codes, or QR Codes, are just old news new. Truth to be told, in Japan and Europe they have been utilized as a piece of advancing and moreover stock control what's more, storing up all
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1818 through the beyond 10 years. The security of one layered (1D) standardized identification is lower than 2D scanner tags. 1D standardized identifications are certainly not hard to examine by separating the lines and the spaces. Regardless, 2D scanner tags are difficult to examine an image plan by natural eyes. As to weightiness, one layered standardized identifications should yield along a solitary heading. On the off chance that the reason for a sweep line doesn't fit inside a reach, the information wouldn't be examined precisely. In any case, 2D standardized tags get wide extent of plot for examining. The critical differentiation between the two is the extent of information they can hold or share. Scanner labels are straight one- layered codes and can essentially hold up to 20 mathematical digits, but QR codes are two-layered (2D) lattice standardized tags that can hold 7,089 numeric characters and 4,296 alphanumeric characters, and 1,817 kanji. TABLE 4.CONCLUSIONS REFERENCES 1. Pan Rong and Zhang Kefang, "Discuss of Rational and Irrational Design of Needs Hierarchy in Product Design", Packing Engineering, vol. 29, pp. 115-117, 2008. 2. T. R. Gruber, "A translation approach to portable ontologies", Knowledge Acquisition, vol. 5, no. 2, pp. 199-220, 1993. 3. S. Yuvalatha and V.P. Sumathi, "Automatic Merging of domain specific ontology", In International Journal of Revolution in Electrical and Electronic Engineering (IJREEE), vol. 1, no. 1, Aug 2014. 4. Zhang Na and Gao Xiaokang, "Reevaluation of the value of handicrafts in the post-industrial era [J]", Learning and Practice, vol. 01, pp. 126-132, 2017. 5. Pan Rong and Zhang Kefang, "Discuss of Rational and Irrational Design of Needs Hierarchy in Product Design", Packing Engineering, vol. 29, pp. 115-117, 2008. 6. T. R. Gruber, "A translation approach to portable ontologies", Knowledge Acquisition, vol. 5, no. 2, pp. 199-220, 1993. 7. S. Yuvalatha and V.P. Sumathi, "Automatic Merging of domain specific ontology", In International Journal of Revolution in Electrical and Electronic Engineering (IJREEE), vol. 1, no. 1, Aug 2014. 8. Zhang Na and Gao Xiaokang, "Reevaluation of the value of handicrafts in the post-industrial era [J]", Learning and Practice, vol. 01, pp. 126-132, 2017. The endeavor has inspected that we have encouraged a simple to utilize application which is solid for the clients (clients) as well as clients (carriers). The client can visit securely from the conveyed QR code OTP and can happen with their shopping by visit the shops to buy clothing, embellishments, staple and electronic etc..,.Through online by using this application.it is surely clear and focal work to do shopping with any virtual visits to the shops. In this application the client can see the decisions like foot wear, lights, wooden things, moving things and essentially amassed makes, later the client can pick what to buy and the client can add what to truck to hence buy. After client verification of things the client can see the things requests and the client can see or drop the procedures then, at that point, in case the client can see the suggesting interest the client can follow the plans status like clear, legitimized, squashed and drop. Client can pick the cash down decision to pay for his/her purchasing thing. 9. http://ajast.net/data/uploads/4ajast-9.pdf
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1819 10. http://ijesc.org/upload/15de67d580745fa9233dd99 06e322d67.QR%20Code%20Security%20and%20Sol uti on.pdf 11. http://academicscience.co.in/admin/resources/proje c t/paper/f201405051399309076.pdf 12. https://searchsecurity.techtarget.com/definition/one time-password-OTP 13. https://connect.cognex.com/India-Cognex- IndustrialBarcode-Readers-LP?src=0ebcb667-3333- e911-9137- 00505693004d&cm_campid=0ebcb667- 3333-e91 14. Mohammad Mannan and P. C. Van Oorschot, "Security and Usability: The Gap in Real-World Online Banking" in NSPW'07 North Conway, NH, USA, pp. 18-21, Sep. 2007. 15. Phishing Activity Trends Report, Dec. 2008. 16. Sang-Il Cho, HoonJae Lee, Hyo-Taek Lim and Sang-Gon Lee, OTP Authentication Protocol Using Stream Cipher with Clock-Counter, October 2009. 17. Jean-Daniel Aussel, "Smart Cards and Digital Identity", Telektronikk, vol. 3, no. 4, 2007. 18. HOTP: An HMAC-Based One-Time Password Algorithm, Dec. 2005.