Submit Search
Upload
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
•
0 likes
•
17 views
IRJET Journal
Follow
https://irjet.net/archives/V5/i3/IRJET-V5I391.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
IRJET- Deceptive Visual Impression to Prevent Shoulder Surfer Attack
IRJET- Deceptive Visual Impression to Prevent Shoulder Surfer Attack
IRJET Journal
Ijsrdv8 i10355
Ijsrdv8 i10355
aissmsblogs
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
IRJET - Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
IRJET Journal
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
IRJET Journal
Image authentication for secure login
Image authentication for secure login
IRJET Journal
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
IRJET Journal
Shoulder surfing resistant graphical
Shoulder surfing resistant graphical
Kamal Spring
Recommended
IRJET- Deceptive Visual Impression to Prevent Shoulder Surfer Attack
IRJET- Deceptive Visual Impression to Prevent Shoulder Surfer Attack
IRJET Journal
Ijsrdv8 i10355
Ijsrdv8 i10355
aissmsblogs
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
IRJET - Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
IRJET Journal
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
IRJET Journal
Image authentication for secure login
Image authentication for secure login
IRJET Journal
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
IRJET Journal
Shoulder surfing resistant graphical
Shoulder surfing resistant graphical
Kamal Spring
A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice Recognition
IRJET Journal
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET Journal
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
IJNSA Journal
IRJET- A Shoulder Surfing Resistant Graphical Verification System
IRJET- A Shoulder Surfing Resistant Graphical Verification System
IRJET Journal
IRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET Journal
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET Journal
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET Journal
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
IJECEIAES
CARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PAS
International Journal of Technical Research & Application
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET Journal
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET Journal
Generic Authentication System
Generic Authentication System
IRJET Journal
Fingerprint combination for privacy protection
Fingerprint combination for privacy protection
Migrant Systems
THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING
THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING
IJTRET-International Journal of Trendy Research in Engineering and Technology
IRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray Casting
IRJET Journal
Dm36678681
Dm36678681
IJERA Editor
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
IRJET Journal
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
Conference Papers
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET Journal
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
IJERA Editor
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET Journal
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
IRJET Journal
More Related Content
What's hot
A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice Recognition
IRJET Journal
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET Journal
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
IJNSA Journal
IRJET- A Shoulder Surfing Resistant Graphical Verification System
IRJET- A Shoulder Surfing Resistant Graphical Verification System
IRJET Journal
IRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET Journal
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET Journal
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET Journal
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
IJECEIAES
CARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PAS
International Journal of Technical Research & Application
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET Journal
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET Journal
Generic Authentication System
Generic Authentication System
IRJET Journal
Fingerprint combination for privacy protection
Fingerprint combination for privacy protection
Migrant Systems
THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING
THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING
IJTRET-International Journal of Trendy Research in Engineering and Technology
IRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray Casting
IRJET Journal
Dm36678681
Dm36678681
IJERA Editor
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
IRJET Journal
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
Conference Papers
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET Journal
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
IJERA Editor
What's hot
(20)
A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice Recognition
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
IRJET- A Shoulder Surfing Resistant Graphical Verification System
IRJET- A Shoulder Surfing Resistant Graphical Verification System
IRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
CARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PAS
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
Generic Authentication System
Generic Authentication System
Fingerprint combination for privacy protection
Fingerprint combination for privacy protection
THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING
THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING
IRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray Casting
Dm36678681
Dm36678681
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Similar to IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET Journal
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
IRJET Journal
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
IRJET Journal
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
IRJET Journal
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET Journal
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET Journal
IRJET- Multi-Factor Authentication based on Game Mode for Android Applica...
IRJET- Multi-Factor Authentication based on Game Mode for Android Applica...
IRJET Journal
IRJET - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
IRJET Journal
Break Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation Blast
IRJET Journal
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
IJCST - ESRG Journals
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET Journal
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
IRJET Journal
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
IRJET Journal
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social Networks
IRJET Journal
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
IRJET Journal
A REVIEW ON CANCELABLE BIOMETRIC AUTHENTICATION
A REVIEW ON CANCELABLE BIOMETRIC AUTHENTICATION
IRJET Journal
CrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm Simulator
IRJET Journal
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
IRJET- E-Gatepass System
IRJET- E-Gatepass System
IRJET Journal
Similar to IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
(20)
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Multi-Factor Authentication based on Game Mode for Android Applica...
IRJET- Multi-Factor Authentication based on Game Mode for Android Applica...
IRJET - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
Break Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation Blast
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social Networks
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
A REVIEW ON CANCELABLE BIOMETRIC AUTHENTICATION
A REVIEW ON CANCELABLE BIOMETRIC AUTHENTICATION
CrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm Simulator
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET- E-Gatepass System
IRJET- E-Gatepass System
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
AbhinavSharma374939
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
humanexperienceaaa
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Recently uploaded
(20)
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 409 A SHOULDER SURFING RESISTANCE USING HMAC ALGORITHM Mrs. L.K. Shoba1, Ms. P.I. Nishitha2, Ms. J. Abirami3 1 Assistant professor, Department of Information Technology, Jeppiaar Engineering College, Chennai, Tamil Nadu, India. 2, 3 Department of Information Technology, Jeppiaar Engineering College, Chennai, Tamil Nadu, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Authentication based on passwords is used largely in applications for computer security and privacy. However, human actions such as choosing bad passwords and inputting passwords in an insecure way are regarded as” the weakest link” in the authentication chain. Rather than arbitrary alphanumeric strings, users tend to choose passwords either short or meaningful for easy memorization. With web applications and mobile apps piling up, people can access these applications anytime and anywhere with various devices. This evolution brings great convenience but also increases the probability of exposing passwords to shoulder surfing attacks. Attackers can observe directly or use external recording devices to collect users’ credentials. To overcome this problem, the user is provided with the two-optional authentication system for the user using HMAC and base64 algorithm. The forget password module is designed with an innovative idea. Based on idea of framing forget password questions on the user’s handheld device. Blocking the user account if wrong password injected to the server frequently and intimate the user through Email and user’s alternative mobile number via SMS about current location of the mobile. Key Words: Graphical Passwords, Authentication, Shoulder Surfing Attack. 1. INTRODUCTION Textual passwords have been the most widely used authentication method for decades. Comprised of numbers and upper- and lower-case letters, textual passwords are considered strong enough to resist against brute force attacks. Image-based passwords are vulnerable to shoulder surfing attacks (SSAs). This type of attack either uses direct observation, such as watching over someone’s shoulder or applies video capturing techniques to get passwords, PINs, or other sensitive personal information. To provides authentication by blocking the user account if wrong password injected to the server frequently but recover password using SMS verification. 2. LITERATURE SURVEY 2.1 Cryptanalysis of passwordauthenticationschemes: Current status and key issues In this paper, we presented the survey of all currently available password based authentication schemes and classified them in terms of several crucial criteria. This study will help in developing different password based authentication techniques, which are not vulnerable to different attack scenarios. Two and three party key exchange protocols require secure authentication mechanism for achieving the required goalsand satisfying the security requirements of an ideal password based authentication scheme. Smart cards, which are used in financial transactions, require highlysecureauthentication protocols. 2.2 Graphical Password Authentication: Cloud Securing Scheme In this paper we are representing the authentication given to cloud by using graphical password. We have proposed cloudwith graphical security by meansofimagepassword. We are providing one of the algorithmswhicharebasedon selection of username and images as a password. By this paper we are trying to give set of images on the basis of alphabet series position of charactersin username. Finally cloud is provided with this graphical password authentication. 2.3 Against Spyware Using CAPTCHA in Graphical Password Scheme We propose a new scheme, using CAPTCHA (Completely Automated Public Turing tests to tell Computers and Humans Apart) that retaining the advantages of graphical password schemes, while simultaneously raising the cost of adversaries by orders of magnitude. 2.4 Covert Attention Shoulder Surfing: Human Adversaries Are More Powerful Than Expected In this paper, we show that human adversaries, even without a recording device, can be more effective at eavesdropping than expected, in particular by employing cognitive strategies and by training themselves. Our novel approach called covert attention shoulder surfing indeed can break the well known PIN entry method previously evaluated to be secure against shoulder surfing. Another contribution in this paper is the formal modelingapproach by adapting the predictive human performance modeling tool for security analysis and improvement. Wealsodevise a defense technique in the modeling paradigm to deteriorate severely the perceptual performance of the adversaries while preserving that of the user. To the best
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 410 of our knowledge, this is the first work to model and defend the new form of attack through human performance modeling. Real attack experiments and user studies are also conducted. 2. 5 S3PAS: A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme In this paper, we propose a Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme (S3PAS). S3PAS seamlesslyintegratesbothgraphical and textual password schemes and provides nearly perfect resistant to shoulder-surfing, hidden-camera and spyware attacks. It can replace or coexist with conventional textual password systems without changing existing userpassword profiles. Moreover, it is immune to brute-force attacks through dynamic and volatile session passwords. S3PAS shows significant potential bridging the gap between conventional textual password and graphical password. Further enhancements of S3PAS scheme are proposed and briefly discussed. Theoretical analysis of the security level using S3PAS is also investigated 3. EXISTING SYSTEM The Existing system the users upload or select the pre- defined image that provided by the server as a password image. If user selected the image as password the server process with the image and split the passwordimageto7x11 grids and display all grid images to the user, and user select the single grid as a password grid for the particular image. And user upload with multiple images as user need and select each grid as a password for an image. And while login the user is provided with the login indicator (temporary password). The login indicator is only visible while holding the proximity sensor of the user device and the holding the screen in circle image. Now the user is provided with the login indicator, here the user now displayedwiththegridded password image with movable horizontal alphabeticbarand movable vertical numeric bar. Your login indicator will be in the form of A6. In vertical and horizontal bar, the alphabets and numeric valueswill be mismatchinorder.The user can move the bar values by using navigation keys provided bellow. By moving the user should move the value A vertically straight to the password grid. And move value 6 horizontal straight to the password grid. And press OK the grid will be authenticated. And user provided with next image with new login indicator. User shouldauthenticatethe images till the last image provided by the user will registration. 4. PROPOSED SYSTEM In our system, we are providing authentication by two optional authentication systems for the user (one is the existing and another model is proposed by us). Proposed model provides the user friendly and the interactive environment for the user. The efficient and the innovative banking service provided for the authentication system.The forget password module is designed with an innovativeidea. Based on idea of framing forget password questions on the user’s handheld device. Blocking the user account if wrong password injected to the server frequently and intimate the user through e-mail and user’s alternative mobile number via SMS about current location of the mobile. 5. BLOCK DIAGRAM Fig.5.1. Architecture diagram of shoulder surfing resistance using HMAC algorithm. 6. MODULES 1. Account creation and registering your password. 2. Authentication using existing graphical authentication. 3. Authentication using proposed graphical authentication. 4. Forget password and recovering module 5. Banking services. 6.1 Account creation and registering your password: The users register the account with providing the user information and the optional mobile number and the email to make alert about your account in some extremecases.The
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 411 users upload or select the pre-defined image that provided by the server as a password image. If user selectedtheimage as password the server process with the image and split the password image to 7x11 grids and display all grid images to the user, and user select the single grid as a password grid for the particular image. And user upload with multiple images as user need and select each grid as a password for an image. If you click finish your password willbestoredand account will be registered. 6.2 Authentication using existing graphical authentication: While login the user is provided with the login indicator (temporary password). The login indicator is only visible while holding the proximity sensor of the user device and the holding the screen in circle image. Now the user is provided with the login indicator, here the user now displayed with the gridded password image with movable horizontal alphabetic bar and movable vertical numeric bar. Your login indicator will be in the form of A6. In vertical and horizontal bar, the alphabets and numeric valueswillbe mismatch in order. The user can move the bar values by using navigation keys provided bellow. By moving the user should move the value A vertically straight to the password grid. And move value 6 horizontal straight to the password grid. And press OK the grid will be authenticated. And user provided with next image and new login indicator. After completing all image authentications, if the entered is correct your services will be provided. 6.3 Authentication using proposed graphical authentication: Our proposed idea of login gives you the user- friendly authentication system. The system provides the login indicator from the numeric values 0 to 9. Using the proximity sensor and holding the screen using hands to see the indicator to avoid the shoulder surfing attack. After seeing the indicator, the user moves to the authentication activity, there the image uploaded by the user will be loaded and above the image the numeric numbers will scattered throughout the screen. If you touch the single numeric value and drag it. The whole scattered numbers will be moved with respective to the numeric value that you are dragging. You can drag any of the number and you should place your indicator on the image password position you selected during registration. 6.4 Forget password and recovering module: In forget password and recovery module, we achieve this using an innovative idea of security questions about the user handset such ascharging percentage in last 2 days. Have you used camera in last two days? And have you installed any of the application. We concentrate on the log files (camera, battery usage, calendar information, call log, installed applications) of the user mobile and frame the questions based on that. 6.5 Banking services: The banking services we provide are called virtual money concept, initially the user credited with rupees and if user is in need to transfer the money to some otheraccounttheuser go to his withdrawal and enter the amount to transfer. The voucher id generated for the amount you entered. You can share the voucher id to the particular user. He moves to the deposit link and enter the voucher id given by you. The amount will be DEBITED from your account and CREDITED to depositor account. 7. WORK IMPLEMENTATION Create more number of users and each user must have a separate login id and password. ImplementedtheHMACand BASE64 algorithm for authentication. Password recovered by using mobile verification through SMS. 7.1 BASE64 ALGORITHM A keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved cryptographic hash function, in combinationwith a shared secret key. The cryptographic strength of HMAC depends on the properties of the underlying hash function. The HMAC specification in this standard is a generalization of Internet RFC 2104, HMAC, Keyed-Hashing for Message Authentication, and ANSI X9.71, Keyed Hash Message Authentication Code. Base64 encoding takes the original binary data andoperates on it by dividing it into tokens of three bytes. A byte consists of eight bits, so Base64 takes 24bits in total. These 3 bytes are then converted into four printable characters from the ASCII standard. The first step is to take the three bytes (24bit) of binary data and split it into four numbers of six bits. Because the ASCII standard defines the use of seven bits, Base64 only uses 6 bits (corresponding to 2^6 = 64 characters) to ensure the encoded data isprintableandnone of the special characters available in ASCII are used. The algorithm's name Base64 comes from the use of these 64 ASCII characters. The ASCII characters used for Base64 are the numbers 0-9, the alphabets 26 lowercase and 26 uppercase characters plus two extra characters '+' and '/'.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 412 8. SCREENSHOTS Fig 8.1 CONNECTION Fig 8.2 REGISTER Fig 8.3 Login 9. CONCLUSION AND ENHANCEMENT The efficient banking application to inject the account password to the server in the indirect manner using some temporary login indicator in the user interactive manner. And effective banking service using the virtual money concept. Securing the bank accountwhileenteringthewrong password frequently, by blocking account. And the innovative idea of forget password and recover module. Proposed model provides the user friendly and the interactive environment for the user. The efficient and the innovative banking service provided for the authentication system. The forget password module is designed with an innovative idea. Based on idea of framing forget password questions on the user’s handheld device. Blocking the user account if wrong password injected to the server frequently and intimate the user through Email and user’s alternative mobile number via SMS about current locationofthemobile. 10. REFERENCES [1] S. Sood, A. Sarje, and K. Singh, “Cryptanalysisofpassword authentication schemes: Current status and key issues,” in Methods and Models in Computer Science, 2009. ICM2CS 2009. Proceeding of International Conference on, Dec 2009, pp. 1–7. [2] S. Gurav, L. Gawade, P. Rane, and N. Khochare, “Graphical password authentication: Cloud securing scheme,” in Electronic Systems, Signal Processing and Computing Technologies(ICESC), 2014 International Conferenceon,Jan 2014, pp. 479–483. 1[3] K. Gilhooly, “Biometrics: Getting back to business,” Computerworld, May, vol. 9, 2005. [4] R. Dhamija and A. Perrig, “Deja vu: A user study using images for authentication,” in Proceedings of the 9th conference on USENIX Security Symposium-Volume 9. USENIX Association, 2000, pp. 4–4. [5] A. De Angeli, M. Coutts, L. Coventry, G. Johnson, D. Cameron, and M. Fischer, “Vip: a visual approach to user authentication,” in Proceedings of the Working Conference on Advanced Visual Interfaces. ACM, 2002, pp. 316–323. [6] I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, “The design and analysis of graphical passwords,” in Proceedings of the 8th conference on USENIX Security Symposium-Volume 8. USENIX Association, 1999, pp. 1–1 [7] S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, “Passpoints: Design and longitudinal evaluationofa graphical password system,” International Journal of Human-Computer Studies, vol. 63, no. 1-2, pp. 102–127, 2005.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 413 [8] A. Paivio, T. Rogers, and P. Smythe, “Why are pictures easier torecall than words?” Psychonomic Science, 1968. [9] D. Nelson, U. Reed, and J. Walling, “Picture superiority effect,” Journal of ExperimentalPsychology:HumanLearning and Memory, vol. 3, pp. 485–497, 1977. [10] S. Brostoff and M. Sasse, “Are passfaces more usable than passwords? a field trial investigation,” PEOPLE AND COMPUTERS, pp. 405–424, 2000. BIOGRAPHIES Ms. J. ABIRAMI Pursuing degree in Information Technology at Jeppiaar SRR Engineering college, Chennai, Tamil Nadu. Ms. P. I. NISHITHA Pursuing degree in Information Technology at Jeppiaar SRR Engineering college, Chennai, Tamil Nadu
Download now