Research Article | Open Access | Download PDF
Volume 6 | Issue 6 | Year 2016 | Article Id. IJCOT-V37P304 | DOI : https://doi.org/10.14445/22492593/IJCOT-V37P304
Providing Security to User Data using OTP and Image CAPTCHA
K. L. R. S. Himaja, Mrs.T. Sri Lakshmi
Citation :
K. L. R. S. Himaja, Mrs.T. Sri Lakshmi, "Providing Security to User Data using OTP and Image CAPTCHA," International Journal of Computer & Organization Trends (IJCOT), vol. 6, no. 6, pp. 17-19, 2016. Crossref, https://doi.org/10.14445/22492593/IJCOT-V37P304
Abstract
Data Security is that preventing from unauthorized disclosure and modification. The basic and old method of computer authentication is to use alphanumerical usernames and passwords. This method has been shown to have important drawbacks i.e., These passwords are prone to be stolen and vulnerable to different types of attacks. Then Captcha technology came into existence but again it fails as an individual. Then after graphical password came into existence and has its own drawbacks. This paper provides OTP and image captcha together which provides high security.
Keywords
Captcha, Otp, User Authentication.
References
[1] Hung-Min Sun, Yao-Hsin Chen, and Yue-Hsun Lin, oPass: “A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks”, Ieee Transactions On Information Forensics And Security, Vol. 7, No. 2, April 2012.
[2] Prof. Bogiri Nagaraju Computer KJCOEMR Pune, Maharashtra,"Authentication Schemes for Session Passwords using Hybrid and Paired based Techniques", Multidisciplinary Journal of Research in Engineering and Technology Volume 1, Issue 2, Pg.175-182.
[3] Michel Abdalla , Emmanuel Bresson, Olivier Chevassut Provably Secure Password-Based Authentication in TLS March 21–24, 2006.
[4] Introduction to Basic Security Concepts by Robert H. Williams III, 2007.
[5] Chun-I Fan, Chien-Nan Wu, Chi-Yao Weng, Chung-Yu Lin Active One-Time Password Mechanism for User Authentication.
[6] Introduction to Basic Security Concepts by Robert H. Williams III, 2007.
[7] A Survey on Different CAPTCHA Techniques Volume 3, No.2, February 2014 Advances in Computer Science and Technology.
[8] R. Biddle, S. Chiasson, and P. C. van Oorschot, “Graphical passwords: Learning from the first twelve years,” ACM Comput. Surveys, vol. 44, no. 4, 2012.
[9] Y.Yesu Jyothi, D.Srinivas, K.Govindaraju, THE SECURED ANTI PHISHING APPROACH USING IMAGE BASED VALIDATION, International Journal of Research in Computer and Communication Technology, Vol 2, Issue 9, September -2013