Downloads: 144 | Views: 319
Research Paper | Computer Science & Engineering | India | Volume 5 Issue 11, November 2016 | Popularity: 6.2 / 10
Secure Image Based One Time Password
Neha Vishwakarma, Kopal Gangrade
Abstract: Most people now access all the important areas of their life?banking, shopping, insurance, medical records, and so on'simply by sitting at their computer and typing a username and password into a website. Getting access to something this way is called one-factor authentication, because you need to know only one thing to get into the system the combination of user name and password. In theory, this kind of protection should be reasonably secure, in practice, it's less and less trustworthy. This paper presents an approach to further increase security using a two-factor authentication scheme. This approach required the user to login with a username and password and also generate a One Time Password which will be sent to his email. The One Time Password will be used for authentication any time the user wishes to access a restricted resource. The one time password as the name implies will expire after a single use and after a period of 60 seconds. The system uses random image and text based OTP generation with SHA-512 algorithm and again encryption by using ECC to develop a more secured two factor, one time password. Java Enterprise Edition (JEE) technology was used.
Keywords: One Time Password OTP, Image Based OTP, SHA based One Time Password, Time-based One Time Password TOPT, Cryptography, Email, Authentication
Edition: Volume 5 Issue 11, November 2016
Pages: 680 - 683
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 722
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 703
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 690
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera