13
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Novel concept of data security using sliding image and image digest

&

References

  • Almulhem, A. (February 21–23 2011). A graphical password authentication system World Congress on Internet Security (WorldCIS-2011).
  • ArunPrakash, M., & Gokul, T. R. (2011). Network security-overcome password hacking through graphical password authentication National Conference on Innovations in Emerging Technology, 2011 (pp. 43–48). Erode, India, Tamil Nadu, India.
  • Asmat, N., & Qasirrf, H. S. A. (2019). Conundrum-pass: A new graphical password approach 2nd International Conference on Communication, Computing and Digital systems (C-CODE), Islamabad, Pakistan, 2019 (pp. 282–287).
  • Doiphode, Sh., Jadhav, J., Shelke, P., Pokale, M. S., et al. (February 24 2015). Novel security method using captcha as graphical password. International Journal of Emerging Engineering Research and Technology, 3 no. 2, 18.
  • Eljetlawi, M., & Ithnin, N. (2008). Graphical password: Comprehensive study of the usability features of the recognition base graphical password methods Third International Conference on Convergence and Hybrid Information Technology, Busan, 2008 (pp. 1137–1143).
  • Glory, F. Z., Ul Aftab, A., Tremblay-Savard, O., & Mohammed, N. (2019). Strong password generation based on user inputs, 2019 (pp. 0416–0423). IEEE Publications 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)
  • Joshi, A. M., & Muniyal, B. (2018). Authentication using text and graphical password International Conference on Advances in Computing, Communications and Informatics (ICACCI), Bangalore, 2018 (pp. 381–386).
  • Mathapati, M., Kumaran, T. S., Kumar, A. K., & Kumar, S. V. (2017). Secure online examination by using graphical own image password scheme. Energy Materials (ICSTM), Chennai IEEE International Conference on Smart Technologies and Management for Computing, Communication, Controls, 2017 (pp. 160–164).
  • Yang, G. (2017). Pass Positions: A secure and user-friendly graphical password scheme 4th International Conference on Computer Applications and Information Processing Technology (CAIPT), Kuta Bali, 2017 (pp. 1–5).
  • Yang, G.-C., & Kim, H. (2014). A New Graphical Password Scheme based on Universal Design. Journal of Digital Convergence, 12(5), 231–238. https://doi.org/https://doi.org/10.14400/JDC.2014.12.5.231.
  • Garg, R. et al. (2021) User validation and exchange using 3 image SHA random key and fingerprint, Jetir.org, Vol.8, Issue 4, page no.399-404
  • Yao, B., Sun, H., Zhao, M., Li, J., Yan, G., & Yao, B. On coloring/ labelling graphical groups for creating new graphical passwords. (2017). IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). Chengdu, China, 2017, pp. 1371–1375.
  • Hyun-Chul Jung and Kwang-Kyu Seo, “Jobs and Potential Threat Assessment for Continuous Provision of Cloud Computing Services”, Journal of System and Management Sciences, Vol. 10 (2020) No. 4, pp. 45-61.
  • Lemnouar, N. (2022). Security limitations of Shamir’s secret sharing. Journal of Discrete Mathematical Sciences & Cryptography, 1–13. doi: https://doi.org/10.1080/09720529.2021.1961902
  • Ebong, J., & Babu, G. (2020). Demand for credit in high-density markets in Kampala: Application of digital lending and implication for product innovation. Journal of International Studies, 13(4), 295–313. doi:https://doi.org/10.14254/2071-8330.2020/13-4/21

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.