[go: up one dir, main page]

Kiran et al., 2024 - Google Patents

Machine Learning: Image Authentication Based using 3-Level Security System

Kiran et al., 2024

Document ID
12389695507121542692
Author
Kiran A
Naik S
Kamesh D
Rathula S
Mohanty J
Publication year
Publication venue
2024 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)

External Links

Snippet

Users using computers need passwords in order to be authenticated. There are many unsuccessful ways of identification. Voice recognition makes use of both physical and behavioural characteristics, in contrast to written and graphical passwords, which rely on …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Similar Documents

Publication Publication Date Title
Mali et al. Advanced pin entry method by resisting shoulder surfing attacks
US8997177B2 (en) Graphical encryption and display of codes and text
US9117065B2 (en) Dynamic interactive identity authentication method and system
US9684780B2 (en) Dynamic interactive identity authentication method and system
US9189603B2 (en) Kill switch security method and system
US8327420B2 (en) Authentication system and method
Moallem Human-Computer Interaction and cybersecurity handbook
Polakis et al. Faces in the distorting mirror: Revisiting photo-based social authentication
Ibrahim et al. Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimization
Abiew et al. Design and implementation of cost effective multi-factor authentication framework for ATM systems
Arun Kumar et al. A survey on graphical authentication system resisting shoulder surfing attack
Scaria et al. Enhanced E-commerce application security using three-factor authentication
Mohamed Security of multifactor authentication model to improve authentication systems
Kushwaha An approach for user authentication one time password (numeric and graphical) scheme
Nguyen et al. MB-PBA: Leveraging merkle tree and blockchain to enhance user profile-based authentication in e-learning systems
Hossain et al. Implementing Biometric or Graphical Password Authentication in a Universal Three-Factor Authentication System
KR100927280B1 (en) How to prevent secure string exposure using fake rounds
Marco Facial Recognition Authentication Adds an Extra Layer of Security to Mobile Banking Systems
Alghathbar et al. Noisy password scheme: A new one time password system
Kiran et al. Machine Learning: Image Authentication Based using 3-Level Security System
Kiran et al. Implementation of 3-Level Security System Using Image Grid Based Authentication System
Seksak et al. Choice-Based Graphical Password (CGP) Scheme for web applications
Kaushik et al. A novel graphical password scheme to avoid shoulder-surfing attacks in android devices
Mohammed et al. A new system for user authentication using Android application
Majdalawieh et al. Assessing the Attacks Against the Online Authentication Methods Using a Comparison Matrix: A Case of Online Banking