Enhanced Password Processing Scheme Based On Visual Cryptography and OCR
Keywords:
Abstract
Customary secret phrase change conspires for client verification is to change the passwords into hash esteems. These hash-based secret phrase plans are similarly straightforward and quick on the grounds that those depend on text and celebrated cryptography. Notwithstanding, those can be presented to digital assaults using secret word by breaking instrument or hash- breaking on the web locales. Aggressors can altogether sort out a unique secret word from hash esteem when that is generally straightforward and plain. Thus, many hacking mishaps have been happened prevalently in frameworks embracing those hash- based plans. In this work, we recommend upgraded secret key preparing plan dependent on picture utilizing visual cryptogra- phy (VC). Not quite the same as the customary plan dependent on hash and text, our plan changes a client ID of text type to two pictures scrambled by VC. The client should make two pictures comprised of subpixels by irregular capacity with SEED which incorporates individual data. The worker just has client’s ID and one of the pictures rather than secret word. At the point when the client signs in and sends another picture, the worker can extricate ID by using OCR (Optical Character Recognition). Therefore, it can validate client by contrasting removed ID and the saved one. Our proposition has lower calculation, forestalls digital assault pointed toward hash cracking, and supports confirmation not to uncover individual data like ID to assailants.
References
- Brian Cluster analysis. , West Sussex, U.: Wiley. ISBN 9780470749913, 2011.
- Silva, , "Practical Eclipse Rich Client Platform Projects (1st ed.)". . p. 352. ISBN 1-4302-1827-4, March 2009.
- Riedl, C.; Zanibbi, R.; Hearst, M. A.; Zhu, S.; Menietti, M.; Crusan, J.; Metelsky, I.; Lakhani, K. (February 20, 2016). "Detecting Figures and Part Labels in Patents: Competition-Based Development of Image Processing Algorithms". International Journal on Document Analysis andRecognition. 19 (2):155.
- Gaw, Shirley, and Edward W. Felten, "Password management strategies for online accounts," Proceedings of the second symposiumon Usable privacy and security. ACM, 2006.
- Nguyen, Thi Thu Trang, and Quang Uy Nguyen, "An analysis of Persuasive Text Passwords, "Information and Computer Science (NICS), 2015 2nd National Foundation for Science and Technology Development Conference on. IEEE,2015.
- Tam, Leona, Myron Glassman, and Mark Vandenwauver, "The psychology of password management: a tradeoff between security and convenience, "Behaviour & Information Technology 29.3 (2010): 233- 244.
- Wang, Luren, Yue Li, and Kun Sun, "Amnesia: A Bilateral Generative Password Manager," 2016 IEEE 36th International Conference on Distributed Computing Systems.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.