Submit Search
Upload
IRJET- Deceptive Visual Impression to Prevent Shoulder Surfer Attack
•
0 likes
•
14 views
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i4/IRJET-V5I4282.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET Journal
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET Journal
Dm36678681
Dm36678681
IJERA Editor
IRJET - Chatbot with Gesture based User Input
IRJET - Chatbot with Gesture based User Input
IRJET Journal
Ijsrdv8 i10355
Ijsrdv8 i10355
aissmsblogs
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
IRJET Journal
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET Journal
Recommended
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET Journal
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET Journal
Dm36678681
Dm36678681
IJERA Editor
IRJET - Chatbot with Gesture based User Input
IRJET - Chatbot with Gesture based User Input
IRJET Journal
Ijsrdv8 i10355
Ijsrdv8 i10355
aissmsblogs
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
IRJET Journal
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET Journal
IRJET - Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
IRJET Journal
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password Authentication
IRJET Journal
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET Journal
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
IJTET Journal
IRJET - NETRA: Android Application for Visually Challenged People to Dete...
IRJET - NETRA: Android Application for Visually Challenged People to Dete...
IRJET Journal
IRJET- VI Spectacle – A Visual Aid for the Visually Impaired
IRJET- VI Spectacle – A Visual Aid for the Visually Impaired
IRJET Journal
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
IRJET Journal
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Pi
ijtsrd
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker System
IRJET Journal
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET Journal
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET Journal
IRJET - Augmented Reality: Social Profile Detection by Face Recognition
IRJET - Augmented Reality: Social Profile Detection by Face Recognition
IRJET Journal
IRJET- Survey on Virtual Assistants
IRJET- Survey on Virtual Assistants
IRJET Journal
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET Journal
C6524029320
C6524029320
aissmsblogs
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
IRJET Journal
S0102297102
S0102297102
IOSR Journals
IRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually Impaired
IRJET Journal
Project Synopsis
Project Synopsis
Paras Garg
Next generation engine immobiliser
Next generation engine immobiliser
eSAT Journals
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
IRJET Journal
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
More Related Content
What's hot
IRJET - Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
IRJET Journal
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password Authentication
IRJET Journal
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET Journal
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
IJTET Journal
IRJET - NETRA: Android Application for Visually Challenged People to Dete...
IRJET - NETRA: Android Application for Visually Challenged People to Dete...
IRJET Journal
IRJET- VI Spectacle – A Visual Aid for the Visually Impaired
IRJET- VI Spectacle – A Visual Aid for the Visually Impaired
IRJET Journal
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
IRJET Journal
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Pi
ijtsrd
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker System
IRJET Journal
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET Journal
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET Journal
IRJET - Augmented Reality: Social Profile Detection by Face Recognition
IRJET - Augmented Reality: Social Profile Detection by Face Recognition
IRJET Journal
IRJET- Survey on Virtual Assistants
IRJET- Survey on Virtual Assistants
IRJET Journal
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET Journal
C6524029320
C6524029320
aissmsblogs
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
IRJET Journal
S0102297102
S0102297102
IOSR Journals
IRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually Impaired
IRJET Journal
Project Synopsis
Project Synopsis
Paras Garg
Next generation engine immobiliser
Next generation engine immobiliser
eSAT Journals
What's hot
(20)
IRJET - Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
IRJET - NETRA: Android Application for Visually Challenged People to Dete...
IRJET - NETRA: Android Application for Visually Challenged People to Dete...
IRJET- VI Spectacle – A Visual Aid for the Visually Impaired
IRJET- VI Spectacle – A Visual Aid for the Visually Impaired
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Pi
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker System
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET - Augmented Reality: Social Profile Detection by Face Recognition
IRJET - Augmented Reality: Social Profile Detection by Face Recognition
IRJET- Survey on Virtual Assistants
IRJET- Survey on Virtual Assistants
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
C6524029320
C6524029320
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
S0102297102
S0102297102
IRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually Impaired
Project Synopsis
Project Synopsis
Next generation engine immobiliser
Next generation engine immobiliser
Similar to IRJET- Deceptive Visual Impression to Prevent Shoulder Surfer Attack
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
IRJET Journal
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET Journal
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
IRJET Journal
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
IRJET Journal
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET Journal
Motion capture for Animation
Motion capture for Animation
IRJET Journal
Face Recognition System using OpenCV
Face Recognition System using OpenCV
IRJET Journal
Fingerprint Based Voting
Fingerprint Based Voting
IRJET Journal
Face Recognition Based Payment Processing System
Face Recognition Based Payment Processing System
IRJET Journal
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep Learning
IRJET Journal
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep Learning
IRJET Journal
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET Journal
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET Journal
IRJET- VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management System
IRJET Journal
CREATING CCTV CAMERA SYSTEM USING ARTIFICIAL INTELLIGENCE, IMAGE PROCESSING, ...
CREATING CCTV CAMERA SYSTEM USING ARTIFICIAL INTELLIGENCE, IMAGE PROCESSING, ...
IRJET Journal
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET Journal
Security by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detection
IRJET Journal
IRJET - Biometric Identification using Gait Analyis by Deep Learning
IRJET - Biometric Identification using Gait Analyis by Deep Learning
IRJET Journal
SLIDE PRESENTATION BY HAND GESTURE RECOGNITION USING MACHINE LEARNING
SLIDE PRESENTATION BY HAND GESTURE RECOGNITION USING MACHINE LEARNING
IRJET Journal
Similar to IRJET- Deceptive Visual Impression to Prevent Shoulder Surfer Attack
(20)
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
Motion capture for Animation
Motion capture for Animation
Face Recognition System using OpenCV
Face Recognition System using OpenCV
Fingerprint Based Voting
Fingerprint Based Voting
Face Recognition Based Payment Processing System
Face Recognition Based Payment Processing System
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET- VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management System
CREATING CCTV CAMERA SYSTEM USING ARTIFICIAL INTELLIGENCE, IMAGE PROCESSING, ...
CREATING CCTV CAMERA SYSTEM USING ARTIFICIAL INTELLIGENCE, IMAGE PROCESSING, ...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
Security by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detection
IRJET - Biometric Identification using Gait Analyis by Deep Learning
IRJET - Biometric Identification using Gait Analyis by Deep Learning
SLIDE PRESENTATION BY HAND GESTURE RECOGNITION USING MACHINE LEARNING
SLIDE PRESENTATION BY HAND GESTURE RECOGNITION USING MACHINE LEARNING
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
roncy bisnoi
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
sivaprakash250
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
ranjana rawat
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
rknatarajan
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
Recently uploaded
(20)
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
IRJET- Deceptive Visual Impression to Prevent Shoulder Surfer Attack
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1268 DECEPTIVE VISUAL IMPRESSION TO PREVENT SHOULDER SURFER ATTACK Kalaichelvi1, Raghav kumar2, Ravikumar3, Sathish kumar4 1Assistant Professor, Department Of ECE, V.S.B Engineering College, Karur, Tamil Nadu, India 2,3,4UG Students, Department of ECE, V.S.B Engineering College, Karur, Tamil Nadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract- Nowadays shoulder surfer attack is a big threat for password authentication process. Authentication based on passwords is used largely in applications such as mobile phones, computer security and banking systems. For an attacker, it is too easy to crack the password in more densely populated area. To overcome this problem we proposed a deceptive visual impression PIN for password authentication process. We are using the concept of hybrid image in virtual keypad to make password authentication more secure. Key Words- Shoulder-Surfing, Hybrid Image, Human Visual Perception, PIN Authentication, Video Attack, Deceptive visual impression 1. Introduction Shoulder surfer attack is the act of stealing and spying others personal identification such as passwords and other details by standing back from the person. Authentication methods which are not strong to monitoring are sensitive to shoulder surf. Attackers can also do shoulder surfing in long distance by using binoculars and other viewing devices. It is an effective way to get the information and easily crack their required information such as banking details. When someone is unlocking their mobile phone on the street or in the subway, shoulders surfing is facilitated in such scenarios since it is easier for an attacker to stand close to the user while escaping people’s attention. Shoulder surfer attackers are mainly focused on ATM machines to know debit card pin and their details. They are also using hidden cameras in their shirts to capture. We are proposed the virtual keypad for touch screen devices. It is in combination of two keypads and it is used in the form of soft keypad, which appears on a display screen for pin authentication. So we implemented the hybrid image concept to control the shoulder surfer attack problem. Hybrid image is nothing but it is an image consists of two different images in a single image based on the viewing angle and distance we can view any one image at a time. 2. OBJECTIVE The main objective is to prevent shoulder surfing attack and make password authentication more secure. We are using the concept of deceptive visual impression concept in hybrid image. The method consists of hybrid image to blend two keypads with different digit orderings for each authentication process. The person who is going to enter the pin is able to view one keypad and the person who is standing behind the user able to view the other keypad at a time. It is based on distances of two persons with respect to the virtual keypad. We used an algorithm to determine whether the user keypad is visible to the person at a certain distance. 3. LITERATURE SURVEY From the literature survey we have selected the base paper entitled as “An Improved Graphical Authentication System to Resist the Shoulder Surfing Attack”(IEEE 2017 International Conference on Technical Advancements in Computers and Communications). It is a method that uses graphical password authentication to resist shoulder surfing. The paper titled as “Preventing Shoulder Surfing using Randomized Augmented Reality Keyboard (IEEE 2017 AnindyaMaiti, MurtuzaJadliwala and Chase Weber Electrical Engineering and Computer Science Department Wichita State University, USA). It consists a augmented reality wearable devices that shows the keypad arrangement in random manner. The paper titled as “Invisible Secure Keypad Solution Resilient against Shoulder Surfing Attacks”(Div. of Undeclared Majors, Chosun Univ., Gwangju, South Korea, 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing). It describes the comparison of several authentication schemes and develops anti shoulder surfing security solution. 4. EXISTING METHOD A Personal Identification Number (PIN) is a sequence of digits that checks the identity of a user when it is successfully entered. The development of pin authentication is a result of its continuous usage for many years in a wide range of day-to-day life applications like mobile devices, computers and banking systems. In the existing method, shoulder surfing can be resisted by many ways. There is a method known as random keypad arrangement for password authentication process. The Obscurity method defines that the visual data of information has to be obscured. For example, Shield pin requires the person to physically cover the keypad by cupping one hand while using the other hand to enter the PIN.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1269 The Visual Complexity method defines that it has to be difficult to receive the visual data interest. For example, graphical password authentication that allows the person to create a free form drawing on a touch screen devices and use it as user password. In the above existing methods, the main drawback is we can easily capture the details by using video recording cameras. Those above methods cannot resist the shoulder surfer attack in a complete manner. Due to this reason, we implemented the virtual keypad based on hybrid images. Fig a) Existing method diagram 5. PROPOSED METHOD In proposed, we created the virtual keypad with deceptive visual impression PIN. The virtual keypad is composed of two keypads with alternative digit orderings, combined in a single hybrid image. The keypad shows different values for user and attacker based on visibility algorithm that consider distance as major factor for keypad changing. Fig b) Proposed method diagram The visibility algorithm is mainly used to create the deceptive visual impression keypad. It determines whether the keypad is visible to a certain distance or not. It consists of the following steps: 1. Distance as filtering 2. Visibility Index 3. Threshold value of the visibility index 6. ALGORITHM EXPLANATION The visibility algorithm receives input as a hybrid image and a viewing distance for the keypad. It returns the binary prediction values to ensure the user keypad is visible to a respective distance or not. Fig c) Flow Chart 6.1. Distance as filtering: In this step, we need to stimulate the user keypad from the viewing position at a certain distance. It is done by filtering the image. The distance as filtering defines that we can stimulate the way in which the image is viewed at a particular distance filtering the image by using low pass filter. Every observer was looking directly at an image and his viewing position was completely defined by his viewing distance. Perception of an image depends on the visual angle, no matter where the observer stands.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1270 6.2. Visibility Index: The visibility index is the corner stone of our algorithm and we would like to clarify its behavior and the intuition behind it. The visibility index is the mean value of the 10 MSSIM (mean structural similarity index) values the pairs of corresponding buttons. The maximum value of the threshold value is 1. It is obtained when the user keypad is out of distance. One of the additional advantages is that the MSSIM is easily calculated. 6.3. Threshold value of a visibility index: Based on the visibility index we set threshold Vth value when a particular observer is able to marginally recognize the digits of a user’s keypad. Then, the visibility algorithm calculates the visibility index for the inputs I and N. Then we compare it with vth. If v>=vth, we determine user keypad cannot be viewed by the observer. If v<=vth, we determine that the person is able to determine the digits of a users keypad. Since the threshold value will vary for different observers and corresponds to people with strongest vision 7. CONCLUSION To this end we created the deceptive visual impression pin and the virtual keypad for the personal identification number validation have high resistant on shoulder surfer attacks. We increased the level of security to prevent shoulder surfer attacks. We implemented visibility algorithm in hybrid image to combine the keypads and to show the user keypad at a certain distance. It can also provide high security to user login pattern. The visibility algorithm gives a better visual representation during keypad authentication and the keypad gets shuffled after every authentication. 8. FUTURE WORK In future work, we can create this deceptive visual impression technique in alphabets and we will implement this technique in android application to improve mobile security. 9. REFERENCE [1] N. K. Ratha, J. H. Connell, R. M. Bolle , “Enhancing security and privacy in biometrics-based authentication systems": 2012 IEEE Symposium on. IEEE, 2012, pp. 553–567. [2] M. Harbach, A. De Luca, and S. Egelman, “The anatomy of smartphone unlocking,” in Proceedings of the 34th Annual ACM Conference on Human Factors in Computing Systems, CHI, 2016. [3] Asher D’Mello, RohanBagwe, Victor Fernandes, AnkitaKaria, “Graphical Password Authentication Implementation and Evaluation of Personalized Persuasive Cued Click Points" : 2012, vol. 7397, pp. 25– 40. [4] R. Anderson, “Why cryptosystems fail,” in Proceedings of the 1st ACM Conference on Computer and Communications Security. ACM, 1993, pp. 215–227. [5] A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith, “Smudge attacks on smartphone touch screens.” WOOT, vol. 10, pp. 1–7, 2010. [6] A. Oliva, A. Torralba, and P. G. Schyns, “Hybrid images,” ACM Transactions on Graphics (TOG), vol. 25, no. 3, pp. 527–532, 2006. [7] D. Kim, P. Dunphy, P. Briggs, J. Hook, J. W. Nicholson, J. Nicholson, and P. Olivier, “Multi-touch authentication on tabletops,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2010, pp. 1093–1102. [8] L.-W. Chan, T.-T.Hu, J.-Y.Lin, Y.-P. Hung, and J. Hsu, “On top of tabletop: A virtual touch panel display,” in Horizontal Interactive Human Computer Systems, 2008. TABLETOP 2008.3rd IEEE International Workshop on. IEEE, 2008, pp. 169–176. [9] W. Matusik, C. Forlines, and H. Pfister, “Multiview user interfaces with an automultiscopic display,” in Proceedings of the working conference on Advanced visual interfaces. ACM, 2008, pp. 363–366
Download now