Kiran et al., 2024 - Google Patents
Machine Learning: Image Authentication Based using 3-Level Security SystemKiran et al., 2024
- Document ID
- 12389695507121542692
- Author
- Kiran A
- Naik S
- Kamesh D
- Rathula S
- Mohanty J
- Publication year
- Publication venue
- 2024 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)
External Links
Snippet
Users using computers need passwords in order to be authenticated. There are many unsuccessful ways of identification. Voice recognition makes use of both physical and behavioural characteristics, in contrast to written and graphical passwords, which rely on …
- 238000010801 machine learning 0 title description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mali et al. | Advanced pin entry method by resisting shoulder surfing attacks | |
US8997177B2 (en) | Graphical encryption and display of codes and text | |
US9117065B2 (en) | Dynamic interactive identity authentication method and system | |
US9684780B2 (en) | Dynamic interactive identity authentication method and system | |
US9189603B2 (en) | Kill switch security method and system | |
US8327420B2 (en) | Authentication system and method | |
Moallem | Human-Computer Interaction and cybersecurity handbook | |
Polakis et al. | Faces in the distorting mirror: Revisiting photo-based social authentication | |
Ibrahim et al. | Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimization | |
Abiew et al. | Design and implementation of cost effective multi-factor authentication framework for ATM systems | |
Arun Kumar et al. | A survey on graphical authentication system resisting shoulder surfing attack | |
Scaria et al. | Enhanced E-commerce application security using three-factor authentication | |
Mohamed | Security of multifactor authentication model to improve authentication systems | |
Kushwaha | An approach for user authentication one time password (numeric and graphical) scheme | |
Nguyen et al. | MB-PBA: Leveraging merkle tree and blockchain to enhance user profile-based authentication in e-learning systems | |
Hossain et al. | Implementing Biometric or Graphical Password Authentication in a Universal Three-Factor Authentication System | |
KR100927280B1 (en) | How to prevent secure string exposure using fake rounds | |
Marco | Facial Recognition Authentication Adds an Extra Layer of Security to Mobile Banking Systems | |
Alghathbar et al. | Noisy password scheme: A new one time password system | |
Kiran et al. | Machine Learning: Image Authentication Based using 3-Level Security System | |
Kiran et al. | Implementation of 3-Level Security System Using Image Grid Based Authentication System | |
Seksak et al. | Choice-Based Graphical Password (CGP) Scheme for web applications | |
Kaushik et al. | A novel graphical password scheme to avoid shoulder-surfing attacks in android devices | |
Mohammed et al. | A new system for user authentication using Android application | |
Majdalawieh et al. | Assessing the Attacks Against the Online Authentication Methods Using a Comparison Matrix: A Case of Online Banking |