Submit Search
Upload
IRJET - Authentication using Image Selection and Voice Recognition
•
0 likes
•
4 views
IRJET Journal
Follow
https://irjet.net/archives/V7/i3/IRJET-V7I3431.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice Recognition
IRJET Journal
Resume_AbinashMohanty
Resume_AbinashMohanty
Abinash Mohanty
IRJET- Face Recognition based Attendance System using Raspberry Pi
IRJET- Face Recognition based Attendance System using Raspberry Pi
IRJET Journal
Secure outsourced attribute based signatures
Secure outsourced attribute based signatures
Adz91 Digital Ads Pvt Ltd
Multi-user media streaming service for e-learning based web real-time communi...
Multi-user media streaming service for e-learning based web real-time communi...
IJECEIAES
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET Journal
Satish resume
Satish resume
Satish Lokkoju
Timeline Chat Android Project
Timeline Chat Android Project
Some Aditya Mandal
Recommended
A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice Recognition
IRJET Journal
Resume_AbinashMohanty
Resume_AbinashMohanty
Abinash Mohanty
IRJET- Face Recognition based Attendance System using Raspberry Pi
IRJET- Face Recognition based Attendance System using Raspberry Pi
IRJET Journal
Secure outsourced attribute based signatures
Secure outsourced attribute based signatures
Adz91 Digital Ads Pvt Ltd
Multi-user media streaming service for e-learning based web real-time communi...
Multi-user media streaming service for e-learning based web real-time communi...
IJECEIAES
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET Journal
Satish resume
Satish resume
Satish Lokkoju
Timeline Chat Android Project
Timeline Chat Android Project
Some Aditya Mandal
Paper id 28201415
Paper id 28201415
IJRAT
IRJET- Special Organization through Entity Ruling for Handling E-Grievance
IRJET- Special Organization through Entity Ruling for Handling E-Grievance
IRJET Journal
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key Order
IRJET Journal
Interactive Voice Response System for College automation
Interactive Voice Response System for College automation
IRJET Journal
Centralized Self-service Password Reset: From the Web and Windows Desktop
Centralized Self-service Password Reset: From the Web and Windows Desktop
PortalGuard
Mohit_Jain_Resume
Mohit_Jain_Resume
Mohit Jain
2011 cwne application
2011 cwne application
Realimoh Solutions
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET Journal
Final sds of academic a webpage based android application
Final sds of academic a webpage based android application
preeta sinha
Strayer cis 333 week 11 final exam set 3 new
Strayer cis 333 week 11 final exam set 3 new
olivergeorg
Vision: a web service for face recognition using convolutional network
Vision: a web service for face recognition using convolutional network
TELKOMNIKA JOURNAL
IRJET- Question-Answer Text Mining using Machine Learning
IRJET- Question-Answer Text Mining using Machine Learning
IRJET Journal
Strayer cis 333 week 11 final exam set 3 new
Strayer cis 333 week 11 final exam set 3 new
aagnaa
Managing Passwords for Mobile Users
Managing Passwords for Mobile Users
Hitachi ID Systems, Inc.
IRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face Recognition
IRJET Journal
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
IRJET Journal
Optical Character Recognition based KYC System
Optical Character Recognition based KYC System
IRJET Journal
SMART ANDROID GRAPHICAL PASSWORD
SMART ANDROID GRAPHICAL PASSWORD
IRJET Journal
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET Journal
Online cet
Online cet
ishwarkiran1
ONLINE DOCUMENT VERIFICATION
ONLINE DOCUMENT VERIFICATION
IRJET Journal
More Related Content
What's hot
Paper id 28201415
Paper id 28201415
IJRAT
IRJET- Special Organization through Entity Ruling for Handling E-Grievance
IRJET- Special Organization through Entity Ruling for Handling E-Grievance
IRJET Journal
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key Order
IRJET Journal
Interactive Voice Response System for College automation
Interactive Voice Response System for College automation
IRJET Journal
Centralized Self-service Password Reset: From the Web and Windows Desktop
Centralized Self-service Password Reset: From the Web and Windows Desktop
PortalGuard
Mohit_Jain_Resume
Mohit_Jain_Resume
Mohit Jain
2011 cwne application
2011 cwne application
Realimoh Solutions
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET Journal
Final sds of academic a webpage based android application
Final sds of academic a webpage based android application
preeta sinha
Strayer cis 333 week 11 final exam set 3 new
Strayer cis 333 week 11 final exam set 3 new
olivergeorg
Vision: a web service for face recognition using convolutional network
Vision: a web service for face recognition using convolutional network
TELKOMNIKA JOURNAL
IRJET- Question-Answer Text Mining using Machine Learning
IRJET- Question-Answer Text Mining using Machine Learning
IRJET Journal
Strayer cis 333 week 11 final exam set 3 new
Strayer cis 333 week 11 final exam set 3 new
aagnaa
Managing Passwords for Mobile Users
Managing Passwords for Mobile Users
Hitachi ID Systems, Inc.
IRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face Recognition
IRJET Journal
What's hot
(15)
Paper id 28201415
Paper id 28201415
IRJET- Special Organization through Entity Ruling for Handling E-Grievance
IRJET- Special Organization through Entity Ruling for Handling E-Grievance
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key Order
Interactive Voice Response System for College automation
Interactive Voice Response System for College automation
Centralized Self-service Password Reset: From the Web and Windows Desktop
Centralized Self-service Password Reset: From the Web and Windows Desktop
Mohit_Jain_Resume
Mohit_Jain_Resume
2011 cwne application
2011 cwne application
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
Final sds of academic a webpage based android application
Final sds of academic a webpage based android application
Strayer cis 333 week 11 final exam set 3 new
Strayer cis 333 week 11 final exam set 3 new
Vision: a web service for face recognition using convolutional network
Vision: a web service for face recognition using convolutional network
IRJET- Question-Answer Text Mining using Machine Learning
IRJET- Question-Answer Text Mining using Machine Learning
Strayer cis 333 week 11 final exam set 3 new
Strayer cis 333 week 11 final exam set 3 new
Managing Passwords for Mobile Users
Managing Passwords for Mobile Users
IRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face Recognition
Similar to IRJET - Authentication using Image Selection and Voice Recognition
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
IRJET Journal
Optical Character Recognition based KYC System
Optical Character Recognition based KYC System
IRJET Journal
SMART ANDROID GRAPHICAL PASSWORD
SMART ANDROID GRAPHICAL PASSWORD
IRJET Journal
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET Journal
Online cet
Online cet
ishwarkiran1
ONLINE DOCUMENT VERIFICATION
ONLINE DOCUMENT VERIFICATION
IRJET Journal
IRJET- Tour and Travels
IRJET- Tour and Travels
IRJET Journal
User Documentation Verification Portal
User Documentation Verification Portal
IRJET Journal
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based Method
IRJET Journal
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET Journal
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
IRJET Journal
IRJET- Data Device Dashboard Design
IRJET- Data Device Dashboard Design
IRJET Journal
1. quality control solutions for niche marketing 1-6
1. quality control solutions for niche marketing 1-6
Alexander Decker
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
IRJET Journal
Fingerprint Based Voting
Fingerprint Based Voting
IRJET Journal
Break Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation Blast
IRJET Journal
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
IRJET Journal
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
Image Forgery / Tampering Detection Using Deep Learning and Cloud
Image Forgery / Tampering Detection Using Deep Learning and Cloud
IRJET Journal
Similar to IRJET - Authentication using Image Selection and Voice Recognition
(20)
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
Optical Character Recognition based KYC System
Optical Character Recognition based KYC System
SMART ANDROID GRAPHICAL PASSWORD
SMART ANDROID GRAPHICAL PASSWORD
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
Online cet
Online cet
ONLINE DOCUMENT VERIFICATION
ONLINE DOCUMENT VERIFICATION
IRJET- Tour and Travels
IRJET- Tour and Travels
User Documentation Verification Portal
User Documentation Verification Portal
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based Method
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
IRJET- Data Device Dashboard Design
IRJET- Data Device Dashboard Design
1. quality control solutions for niche marketing 1-6
1. quality control solutions for niche marketing 1-6
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
Fingerprint Based Voting
Fingerprint Based Voting
Break Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation Blast
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
Image Forgery / Tampering Detection Using Deep Learning and Cloud
Image Forgery / Tampering Detection Using Deep Learning and Cloud
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
Call Girls in Nagpur High Profile
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
RajaP95
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
Recently uploaded
(20)
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
IRJET - Authentication using Image Selection and Voice Recognition
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2178 Authentication Using Image Selection and Voice Recognition Ashwin Shinde1, Ketki Khante2 1Assistant Professor, Dept. of CSE, DBACER, Nagpur, Maharashtra, India 2Assistant Professor, Dept. of IT, SBJITMR, Nagpur, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - This thought presents another development in the field of information security that is an application with picture based confirmation and voice based verification and these both will go about as qualification. The picture based watchword inserting with noticeable watermark and discourse acknowledgment for desktop application helps in accomplishing abnormal state of security than the basic alphanumeric secret key and in the meantime more simpleto- utilize. Key Words: Security, Verification, Watermark. 1.INTRODUCTION Confirmation assumes an imperative part in ensuringassets against unapproved utilize. Numerousvalidationformsexist from basic secret key based verification framework to exorbitant biometric confirmation frameworks. So while expanding security is an issue content based passwords are insufficient to handle such issues. The requirement for something more secure alongside being easy to use is required. The procedure of approval canbeaccomplished by utilizing certification, however these days qualification can be effortlessly gotten to and the data is more powerless against such assault. Animal compel assault and there are numerous product accessible which can help in speculating the accreditation. The alphanumeric watchword can be speculated effortlessly by checking the predefined design in this way verification in view of content basedpasswords has significant downsides. More refined confirmation process is expensive and may require extra gear or equipment.Tobeat such disadvantages we built up a framework for check of individual character utilizing C# ASP.NET. In the proposed framework, picture based verification and voice based confirmation can give abnormal state of security and will go about as accreditation. The picture based watchword installed with watermark and Speech Recognition for desktop application helps in accomplishing abnormal state of security than the basic alphanumeric secret keyandinthe meantime simpler to-utilize. [1][2] 2. Related Work This is a straightforward frameworkwhereaclientdisplaysa client ID and a secret word to the framework. On the off chance that the client ID and secret key match with the one put away on the framework, then the client is verified. A client may have many records on numerous PCs. He needs to recollectnumerouspasswords.Examineonhumansubjective capacity hasproducedaconsiderablemeasureofinformation on what an individual can recall [1]. For instance, space names are utilized rather than IP addresses and phone numbers are softened up to lumps for a person to recall effectively. It is additionally demonstrated that people can recall pictures moreeffortlesslythanthecontent.Thegeneral propensity is that an individual may not recall content passwords effortlessly and he may record it.Thiscanprompt to taking watchword to increase unapproved access to a framework. Since passwordscan't be long, theyare anything but difficult to break utilizing savage constrain assaults like endeavoring distinctive passwords (online assault) or by disconnectedassault on the secretkeyhashrecord.Thereare numerous different approaches to break passwords like parcel sniffing, by unplanned disclosure. Arrange activity is anything but difficult to catch and investigate utilizing the instruments accessible in the web. Organize convention analyzers, forexample, Ethereal Packet Sniffer and tcpdump can be utilized to gather bothapproaching and active system information including content based passwords. [1] Biometrics, the utilization of factual examination to distinguish people through their natural or physiological qualities, is developing as a key viewpoint in new security frameworks. Utilizing biometrics, it is conceivable to dodge pitfalls experienced with conventional security frameworks where clients are required to keep data, for example, passwords, safe. Biometric validation frameworks might be extremely sheltered and secure and solid however these frameworks are exorbitant and require extra equipmentand programming support. Theseframeworksarehardtochange and keep up. Sending such frameworks for web might be extremely mind boggling and not reasonable. [1] 3. Proposed Work A. Registration Another client should finish the enrollment procedure by filling the fundamental data. In this module client need to give fundamental data and all the data is put away in the database. The data will containsubtle elements asusername, client id, watchword, versatile number, email id and watermark. The client distinguishing proof should be exceptional and will go about as essential key amid enrollment prepare. The watermark will go about as a special code which when inserted with chose picture will give us more level of security. On the off chance that he/she is as of now enrolled then they ought to login for further process. B. Image based credential generation
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2179 In this module, client need to choose one picture and enter a watermark and should be installed keeping in mind the end goal to separate the picture, and this picture will be exceptional in view of the watermark which was implanted in the picture. Here watermark will be noticeable and as numeric and letters in order. Accordingly the new produced pictures utilizing watermark will go about as first level of certification era. C. Voice based credential generation In this module, client needs to give the voice summon and which will go about as second level of qualification generation.Asp.net give us an instrument to perceive discourse. The System.Speech.Recognition namespace contains window desktop discourse innovation sorts for actualizing discourse recognition.SetupSpeech.ToText() is capacity that calls the correct technique to change over discourse to content .Thus this will be our voice charge for validation. D. Image based authentication In this module, client needs to choose the required picture with a specific end goal to accomplish first level of confirmation. On the off chance that the clientgivesrequired qualification then just can move to second level of verification. E. Voice based authentication In this module, client needs to give the requiredvoicecharge with a specific end goal to accomplish second level of confirmation. In the event that the client gives required accreditation then just can get to further process. 3. Workflow Fig -1: Workflow 4. Implementation A. For opening the required application the user will have to first register himself by clicking to New User here ? if user is already registered then he can directly login. Fig -2: Implementation B. The process for image based credential generation are as follows in given snapshots: Fig -3: Image Based Credentials C. The process for voice based credential generation are as follows in given snapshots:
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2180 Fig -4: Voice Based Credentials Generation D. The process for image based authentication are as follows in given snapshots: Fig -5: Two Layer Authentication E. The process for voice based authentication are as follows in given snapshots: Fig -6: Voice based Authentication 5. CONCLUSION This paper introduces a picture and voice confirmation plot as another option to supplant content based verification framework. The two level of validation gives heartier framework when contrasted with alphanumericverification prepares. Picture based validation utilizing watermark method makes picture based confirmation more solid. Different applications can be shielded from differentsorts of assault and the data can be secured. REFERENCES [1] Srinath Akula andVeerabhadramDevisetty“ImageBased Registration and Authentication System,” Department of Computer Science St cloud State University, St. Cloud, MN 56301. [2] Manish Kumar and Prof (Dr.) Jayant Shekhar “A Study of Implementation of Image Based Authentication System,”Subharti Institute of Technology and Engineering, Meerut, India Volume 4, Issue 4, April 2014. [3] Prof.Shivashankar M.Rampur and Miss.Kavita S.Rampur, “An Approach of Speech Recognition System for Desktop Application,”Volume 5 Issue 12 Dec. 2016, Page No. 19471- 19475.
Download now