2016
DOI: 10.1002/sec.1732
|View full text |Cite
|
Sign up to set email alerts
|

An image edge based approach for image password encryption

Abstract: Authentication plays a major role in ensuring the security of the system by allowing only the authorized user. The traditional authentication system of using text-based passwords has many flaws in the aspects of usability and security issues. Hence, graphical passwords, which consist of clicking or dragging activities on the pictures rather than typing textual characters, were introduced to overcome this problem. However, it is found that these graphical passwords are susceptible to brute force and dictionary … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 6 publications
0
1
0
Order By: Relevance
“…The method for protecting digital photographs is called picture encryption generation [9][10][11][12][13], and its fundamental idea is to encrypt the digital records that are contained within the digital photograph, as well as to acquire the completely exceptional encrypted photographs of the appearance and the genuine digital photograph. This ensures that the content of the digital photograph can't be viewed immediately.…”
Section: International Journal On Recent and Innovation Trends In Com...mentioning
confidence: 99%
“…The method for protecting digital photographs is called picture encryption generation [9][10][11][12][13], and its fundamental idea is to encrypt the digital records that are contained within the digital photograph, as well as to acquire the completely exceptional encrypted photographs of the appearance and the genuine digital photograph. This ensures that the content of the digital photograph can't be viewed immediately.…”
Section: International Journal On Recent and Innovation Trends In Com...mentioning
confidence: 99%
“…Short cycle length is one of the important problems of chaotic keystream generators, which results from the finite precision of computers [24,35]. To solve the problem of randomness and insufficient security of keystream generated by the chaotic system, many scholars have developed several effective encryption algorithms by combining chaotic systems with other methods [10,25,37,47,57], such as breadth-first search [57], DAN coding [25,47], edge password [37], elliptic curve [10] and so on.…”
Section: Introductionmentioning
confidence: 99%