CFP last date
20 January 2025
Reseach Article

AI-Enhanced Multi-Layer Security: Implementing a 3-Level Image-Based Authentication System on Mobile Devices

by Surabhi Anand, Sahil Miglani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 44
Year of Publication: 2024
Authors: Surabhi Anand, Sahil Miglani
10.5120/ijca2024924064

Surabhi Anand, Sahil Miglani . AI-Enhanced Multi-Layer Security: Implementing a 3-Level Image-Based Authentication System on Mobile Devices. International Journal of Computer Applications. 186, 44 ( Oct 2024), 16-18. DOI=10.5120/ijca2024924064

@article{ 10.5120/ijca2024924064,
author = { Surabhi Anand, Sahil Miglani },
title = { AI-Enhanced Multi-Layer Security: Implementing a 3-Level Image-Based Authentication System on Mobile Devices },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2024 },
volume = { 186 },
number = { 44 },
month = { Oct },
year = { 2024 },
issn = { 0975-8887 },
pages = { 16-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number44/ai-enhanced-multi-layer-security-implementing-a-3-level-image-based-authentication-system-on-mobile-devices/ },
doi = { 10.5120/ijca2024924064 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-10-26T00:55:35.892846+05:30
%A Surabhi Anand
%A Sahil Miglani
%T AI-Enhanced Multi-Layer Security: Implementing a 3-Level Image-Based Authentication System on Mobile Devices
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 44
%P 16-18
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile devices play an essential role in daily life by enabling communication, accessing information, and facilitating transactions. This increased reliance has introduced significant security concerns, as sensitive data is stored and transmitted through these devices. As security threats continue to evolve in complexity, it is imperative to adopt authentication mechanisms that not only enhance protection but also provide ease of use. In this paper, a 3-level image-based authentication system is proposed, leveraging artificial intelligence (AI) to improve security on mobile devices. The system aims to offer a more adaptive, resilient, and user-friendly solution by dynamically adjusting to emerging threats. This advanced multi-layer security approach presents a practical response to the growing demand for improved mobile security, ensuring that both convenience and data protection are prioritized.

References
  1. "A Survey of Image-Based Authentication Methods," IEEE Access, vol. 8, pp. 104558-104571, 2020.
  2. "Artificial Intelligence for Cybersecurity: A Survey," ACM Computing Surveys, vol. 53, no. 3, pp. 1-35, Mar. 2021.
  3. S. Anand, P. Jain, Nitin, and R. Rastogi, "Security Analysis and Implementation of 3-Level Security System Using Image-Based Authentication," in 2012 UKSim 14th International Conference on Computer Modelling and Simulation, Cambridge, UK, 2012, pp. 547-552, doi: 10.1109/UKSim.2012.83. https://ieeexplore.ieee.org/document/6205505
  4. Anand, S. (2015). Research and analysis on improving mobile application security by using multi-level authentication including Image Based Authentication (IBA) (Master's thesis, San Diego State University). https://doi.org/10.13140/RG.2.2.14997.74726
  5. "Authentication," Wikipedia, The Free Encyclopedia. [Online]. Available: https://en.wikipedia.org/wiki/Authentication. [Accessed: 24-Aug-2024].
  6. "Biometrics," Wikipedia, The Free Encyclopedia. [Online]. Available: https://en.wikipedia.org/wiki/Biometrics. [Accessed: 24-Aug-2024].
  7. "Artificial Intelligence," Wikipedia, The Free Encyclopedia. [Online]. Available: https://en.wikipedia.org/wiki/Artificial_intelligence. [Accessed: 24-Aug-2024].
  8. "Security Engineering," Wikipedia, The Free Encyclopedia. [Online]. Available: https://en.wikipedia.org/wiki/Security_engineering. [Accessed: 24-Aug-2024].
  9. Anand, S. (2024). Real-time AI-driven predictive analytics for agile software development: Enhancing decision-making, resource optimization, and risk mitigation. https://doi.org/10.13140/RG.2.2.27815.36004
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Security Image-Based Authentication Artificial Intelligence Multi-Layer Security Adaptive Authentication