📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 5, ISSUE 2, FEBRUARY 2016

Keylogging-resistant Visual Authentication Protocol

Prof.Diksha Bhave, Pratiksha Bhavsar, Surekha Chavan, Krutika Gore

DOI: 10.17148/IJARCCE.2016.52117

Abstract: The Keystroke logging, referred to as key logging or capturing the strokes of keyboard, is the act of recording which means logging the keys pressed on a keyboard, other way round it is, that the person using the keyboard is unknown about the fact that their actions are being observed. Key logging can also be used to study human�computer interaction. We have large number of key logging methods that range from hardware and software approaches to acoustic analysis. Here we have proposed two visual authentication protocols one is a one-time-password protocol, the other one is password-based authentication protocol. We verify that our protocols are much strong and can with stand to many of the challenging authentication attacks. Our main focus is to highlight the potential of our approach for real-world deployment: whether we can achieve a high level of usability with satisfactory and acceptable results.



Keywords: Key logging, Authentication, Transaction, QR code.

How to Cite:

[1] Prof.Diksha Bhave, Pratiksha Bhavsar, Surekha Chavan, Krutika Gore, “Keylogging-resistant Visual Authentication Protocol,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2016.52117