Generate Secure Image Based Password to Access Cloud Data

Authors

  • Akshada Sunil Thakar  Department of Computer Engineering, Zeal College of Engineering & Research, Pune
  • Sakshi Vinod Jadhav  Department of Computer Engineering, Zeal College of Engineering & Research, Pune

Keywords:

Image Steganography, Reputation Primarily Based Totally.

Abstract

In an extremely deliberate technique we have a tendency to apply the information encryption and steganography method to stable the photo era to stable get right of entry to at the information server’s files, for added protection splitting method wont to the stegno photo for verification server element and purchaser element person know-how. This machine gives strong know-how protection to garage on nearby cloud server and that we moreover provide the strong community conversation protection to registered customers throughout know-how uploads and downloads person know-how. In this machine covered the idea of producing companion affordable set of rules for generates stable photo based authentication machine.

References

  1. John K. Alhassan, Idris Ismaila, Victor O. Waziri, and Adamu Abdulkadir, “A Secure technique to cover Confidential knowledge mistreatment Cryptography and Steganography”, Federal University of Technology, Minna, African country November twenty eight – thirty, 2016.
  2. R. Nivedhitha, Dr. T.Meyyappan, “Image Security mistreatment Steganography And science Techniques”, International Journal of Engineering Trends and Technology- Volume3Issue3- 2012.
  3. Ako Muhammad Abdullah, Roza Hikmat Hama Aziz, “New Approaches to encode and decipher knowledge in Image mistreatment Cryptography and Steganography Algorithm” International Journal of pc Applications, Volume 143 – No.4, June 2016.
  4. Dipankar Dasgupta, Rukhsana Azeem,” A Negative Authentication System” 2007 (revised on Gregorian calendar month fifteen, 2007), The University of Memphis. [5] Zubayr Khalid, Pritam Paul, Khabbab Zakaria, Himadri Nath Saha, “An encoding Key for Secure Authentication: The Dynamic Solution”, Advances in Science, Technology and Engineering Systems Journal Vol. 2, No. 3, 540-544 (2017).
  5. D. Wang, D. He, H. Cheng, and P. Wang, “fuzzyPSM: a brand new secret strength meter mistreatment fuzzy probabilistic context-free grammars,” in Proceedings of 2016 forty sixth Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun. 2016, pp. 595–606.
  6. Aparna Mote and Pratima Patl,”E-commerce Sites with Outfit Composition using Deep Learning Method”, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-10, August 2019
  7. H. M. Sun, Y. H. Chen, and Y. H. Lin, “oPass: A user authentication protocol immune to secret stealing and secret recycle attacks,” IEEE Transactions on data Forensics and Security, vol. 7, no. 2, pp. 651–663, Apr. 2012.
  8. Y. Li, H. Wang, and K. Sun, “Personal data in passwords and its security implications,” IEEE Transactions on data Forensics and Security, vol. 12, no. 10, pp. 2320–2333, Oct. 2017.
  9. D. Florencio and C. Herley, “A large-scale study of net secret habits,” in Proceedings of the sixteenth International Conference on World Wide net. ACM, 2007, pp. 657–666.
  10. R. Shay, S. Komanduri, A. L. Durity, P. S. Huh, M. L. Mazurek, S. M. Segreti, B. Ur, L. Bauer, N. Christin, and L. F. Cranor, “Designing secret policies for strength and value,” ACM Transactions on data and System Security, vol. 18, no. 4, pp. 13:1–13:34, May 2016.

Downloads

Published

2022-04-30

Issue

Section

Research Articles

How to Cite

[1]
Akshada Sunil Thakar, Sakshi Vinod Jadhav, " Generate Secure Image Based Password to Access Cloud Data" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 2, pp.465-468, March-April-2022.