International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 144

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 11, November 2016


Secure Image Based One Time Password

Neha Vishwakarma | Kopal Gangrade


Abstract: Most people now access all the important areas of their life?banking, shopping, insurance, medical records, and so on'simply by sitting at their computer and typing a username and password into a website. Getting access to something this way is called one-factor authentication, because you need to know only one thing to get into the system the combination of user name and password. In theory, this kind of protection should be reasonably secure, in practice, it's less and less trustworthy. This paper presents an approach to further increase security using a two-factor authentication scheme. This approach required the user to login with a username and password and also generate a One Time Password which will be sent to his email. The One Time Password will be used for authentication any time the user wishes to access a restricted resource. The one time password as the name implies will expire after a single use and after a period of 60 seconds. The system uses random image and text based OTP generation with SHA-512 algorithm and again encryption by using ECC to develop a more secured two factor, one time password. Java Enterprise Edition (JEE) technology was used.


Keywords: One Time Password OTP, Image Based OTP, SHA based One Time Password, Time-based One Time Password TOPT, Cryptography, Email, Authentication


Edition: Volume 5 Issue 11, November 2016,


Pages: 680 - 683


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Neha Vishwakarma, Kopal Gangrade, "Secure Image Based One Time Password", International Journal of Science and Research (IJSR), Volume 5 Issue 11, November 2016, pp. 680-683, https://www.ijsr.net/get_abstract.php?paper_id=ART20162887

Similar Articles with Keyword 'Cryptography'

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya [10] | R. Sathya [8]

Share this Article
Top