Research Paper | Computer Science & Engineering | India | Volume 5 Issue 11, November 2016
Secure Image Based One Time Password
Neha Vishwakarma, Kopal Gangrade
Most people now access all the important areas of their life?banking, shopping, insurance, medical records, and so on?simply by sitting at their computer and typing a username and password into a website. Getting access to something this way is called one-factor authentication, because you need to know only one thing to get into the system the combination of user name and password. In theory, this kind of protection should be reasonably secure, in practice, it's less and less trustworthy. This paper presents an approach to further increase security using a two-factor authentication scheme. This approach required the user to login with a username and password and also generate a One Time Password which will be sent to his email. The One Time Password will be used for authentication any time the user wishes to access a restricted resource. The one time password as the name implies will expire after a single use and after a period of 60 seconds. The system uses random image and text based OTP generation with SHA-512 algorithm and again encryption by using ECC to develop a more secured two factor, one time password. Java Enterprise Edition (JEE) technology was used.
Keywords: One Time Password OTP, Image Based OTP, SHA based One Time Password, Time-based One Time Password TOPT, Cryptography, Email, Authentication
Edition: Volume 5 Issue 11, November 2016
Pages: 680 - 683
How to Cite this Article?
Neha Vishwakarma, Kopal Gangrade, "Secure Image Based One Time Password", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20162887, Volume 5 Issue 11, November 2016, 680 - 683
134 PDF Views | 126 PDF Downloads
Similar Articles with Keyword 'Cryptography'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2394 - 2397Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur
Similar Articles with Keyword 'Email'
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 1155 - 1157Avoidance of Unauthorized user using Visual Cryptography
Dayanand G Savakar, Pandurang H Biradar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1058 - 1060Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving
Rushikesh P. Dhanokar
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 1320 - 1324Optimization of Data Storage and Fault Tolerance Strategies in Cloud Computing
Dr. C. Vijay Kumar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1368 - 1371Spam and Zombie Detection System with Machine Learned Spot Algorithm
Manishankar.S, Sobin E. S
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2313 - 2317Enhanced Phishing Detection based on Image Differentiation
B. Jenny Jyoshna, Shaik Nyamathulla
Similar Articles with Keyword 'Authentication'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2234 - 2237Analysis of Protective Mechanism in Roaming Network for Secure Communication
Ashwini A. Lokhande, Sonali U. Nimbhorkar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2483 - 2487Accountability of Data usage in Cloud Computing
Nitin P. Doiphode, Hemlata Channe
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017
Pages: 1760 - 1762A Survey on Existing Password Storage Methods and their Security
Samruddhi Patil, Kumud Wasnik
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 842 - 845Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad