A NOVEL APPROACH OF AUTHENTICATION USING PIXEL VALUE GRAPHICAL PASSWORD SCHEME is popular PDF and ePub book, written by MOHD SHUKRAN MOHD AFIZI in 2015-03-31, it is a fantastic choice for those who relish reading online the Computers genre. Let's immerse ourselves in this engaging Computers book by exploring the summary and details provided below. Remember, A NOVEL APPROACH OF AUTHENTICATION USING PIXEL VALUE GRAPHICAL PASSWORD SCHEME can be Read Online from any device for your convenience.

A NOVEL APPROACH OF AUTHENTICATION USING PIXEL VALUE GRAPHICAL PASSWORD SCHEME Book PDF Summary

In decades, authentication system is relying on username and password as passphrase object for authentication process. The username and password mechanism bring major problem lately and raising the system developer worries on security for client server communication. Many methods and mechanisms are being introduced to overcome this authentication flaws. One of mechanism that has been introduce is graphical password mechanism on purpose to reduce human memory burden based on psychological study that shows human is better at recognizing and remembering images. However, the current method result many security flaw on graphical password authentication mechanism and require specific tool which is cannot be easily implement on any computer system platform. To overcome current method flaws, pixel value graphical password scheme is being introduced by combining the text-based password mechanism and graphical password mechanism where the authentication system extracting pixel value that resides in a digital image file. The extracted eight bits pixel value is used as the passphrase alongside with username during authentication process. The design and development of this method is based on identified graphical password enhancement and user requirement through literature review analysis. Results on literature analysis are being referred to develop the system flow and system design as the design concept which is being used for prototyping development. The developed prototype is being tested with several collections of image specimens as image experimental testing. Results and output from the testing show promising results as the result for Pixel Value graphical password scheme is bring an extremely positive impact. In other words, pixel value graphical password scheme is bringing graphical password scheme a secure promising authentication implementation.

Detail Book of A NOVEL APPROACH OF AUTHENTICATION USING PIXEL VALUE GRAPHICAL PASSWORD SCHEME PDF

A NOVEL APPROACH OF AUTHENTICATION USING PIXEL VALUE GRAPHICAL PASSWORD SCHEME
  • Author : MOHD SHUKRAN MOHD AFIZI
  • Release : 31 March 2015
  • Publisher : Anchor Academic Publishing (aap_verlag)
  • ISBN : 9783954899135
  • Genre : Computers
  • Total Page : 123 pages
  • Language : English
  • PDF File Size : 20,8 Mb

If you're still pondering over how to secure a PDF or EPUB version of the book A NOVEL APPROACH OF AUTHENTICATION USING PIXEL VALUE GRAPHICAL PASSWORD SCHEME by MOHD SHUKRAN MOHD AFIZI, don't worry! All you have to do is click the 'Get Book' buttons below to kick off your Download or Read Online journey. Just a friendly reminder: we don't upload or host the files ourselves.

Get Book

Medical Image Watermarking

Medical Image Watermarking Author : Amit Kumar Singh,Basant Kumar,Ghanshyam Singh,Anand Mohan
Publisher : Springer
File Size : 38,6 Mb
Get Book
This book presents medical image watermarking techniques and algorithms for telemedicine and other e...

Image Encryption

Image Encryption Author : Fathi E. Abd El-Samie,Hossam Eldin H. Ahmed,Ibrahim F. Elashry,Mai H. Shahieen,Osama S. Faragallah,El-Sayed M. El-Rabaie,Saleh A. Alshebeili
Publisher : CRC Press
File Size : 39,8 Mb
Get Book
Investigating image encryption approaches, this book examines image encryption algorithms for the pu...

Security and Usability

Security and Usability Author : Lorrie Faith Cranor,Simson Garfinkel
Publisher : "O'Reilly Media, Inc."
File Size : 16,8 Mb
Get Book
Human factors and usability issues have traditionally played a limited role in security research and...

Perfect Password

Perfect Password Author : Mark Burnett
Publisher : Elsevier
File Size : 48,8 Mb
Get Book
User passwords are the keys to the network kingdom, yet most users choose overly simplistic password...

Chaos based Cryptography

Chaos based Cryptography Author : Ljupco Kocarev,Shiguo Lian
Publisher : Springer
File Size : 47,8 Mb
Get Book
Chaos-based cryptography, attracting many researchers in the past decade, is a research field across...