CFP last date
20 January 2025
Reseach Article

Review Paper: Multi-Factor Authentication Scheme

Published on June 2015 by Vasundhara Bhele, Shyam Dubey, Nilesh Chaubey
National Conference on Recent Trends in Computer Science and Engineering
Foundation of Computer Science USA
MEDHA2015 - Number 2
June 2015
Authors: Vasundhara Bhele, Shyam Dubey, Nilesh Chaubey
777cece2-9c13-4aed-a3d5-7d881df64dec

Vasundhara Bhele, Shyam Dubey, Nilesh Chaubey . Review Paper: Multi-Factor Authentication Scheme. National Conference on Recent Trends in Computer Science and Engineering. MEDHA2015, 2 (June 2015), 30-32.

@article{
author = { Vasundhara Bhele, Shyam Dubey, Nilesh Chaubey },
title = { Review Paper: Multi-Factor Authentication Scheme },
journal = { National Conference on Recent Trends in Computer Science and Engineering },
issue_date = { June 2015 },
volume = { MEDHA2015 },
number = { 2 },
month = { June },
year = { 2015 },
issn = 0975-8887,
pages = { 30-32 },
numpages = 3,
url = { /proceedings/medha2015/number2/21436-8032/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Computer Science and Engineering
%A Vasundhara Bhele
%A Shyam Dubey
%A Nilesh Chaubey
%T Review Paper: Multi-Factor Authentication Scheme
%J National Conference on Recent Trends in Computer Science and Engineering
%@ 0975-8887
%V MEDHA2015
%N 2
%P 30-32
%D 2015
%I International Journal of Computer Applications
Abstract

Alpha-Numeric passwords, Textual passwords and Graphical passwords are the technique utilized for authentication reason. At the same time these validation techniques are defenseless against eves dropping, dictionary attacks and shoulder surfing. Graphical passwords are presented set up of textual passwords methods, yet it is tricky to recall graphical passwords. The greater part of the graphical plans are defenseless against shoulder surfing. To remove this issue present new technique for authentication, picture can be joined with water marking methods and make Walsh code pin to produce password for authentication reason. In this paper, two techniques are proposed to create password utilizing watermark picture and Walsh code.

References
  1. R. Dhamija, and A. Perrig. "Déjà Vu: A User Study Using Images for Authentication". In 9th USENIX Security Symposium, 2000.
  2. Jermyn, I. , Mayer A. , Monrose, F. , Reiter, M. , and Rubin. , "The design and analysis of graphical passwords" in Proceedings of USENIX Security Symposium, August 1999.
  3. Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang Liu Uwe Aickelin, "A New Graphical Password Scheme Resistant to Shoulder-Surfing
  4. DCT, http:/www. slideshare. com
  5. S. Man, D. Hong, and M. Mathews, "A shoulder surfing resistant graphical password scheme," in Proceedings of international conference on security and management. Las Vegas, NV, 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Image Processing Watermarking Techniques Walsh Code Dct (discrete Cosine Transform).