2021
DOI: 10.36909/jer.13761
|View full text |Cite
|
Sign up to set email alerts
|

Engineering Graphical Captcha and AES Crypto Hash Functions for Secure Online Authentication

Abstract: Password alone is currently not trusted for user online authentication and security as threats from hackers continue to grow, requiring highly efficient defense safeguard protection against unauthorized users. Therefore, CAPTCHA techniques came into the picture as an automated assistance to distinguish between humans and robots. The CAPTCHA has several applications in the online security domain requiring to be merged with encrypted hash function benefitting from the facility of the graphical password schemes. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
10

Relationship

2
8

Authors

Journals

citations
Cited by 37 publications
(12 citation statements)
references
References 26 publications
(33 reference statements)
0
8
0
Order By: Relevance
“…As pointed out in [29], the protection of personal data from malicious entities and systems must be implemented at different levels such as processing, storage, communication and device levels. Although digital transformation is significant for the healthcare sector, susceptibility to cyber attacks is a fundamental challenge [30], [31], [32], [33].The general public trepidation towards e-healthcare is mainly due to privacy and security issues [30], [34]. Whereas privacy is concerned with the protection of the collected patients' data that can uniquely identify them, security is concerned with the restriction and authorization during access to this personal information [35].…”
Section: Figurementioning
confidence: 99%
“…As pointed out in [29], the protection of personal data from malicious entities and systems must be implemented at different levels such as processing, storage, communication and device levels. Although digital transformation is significant for the healthcare sector, susceptibility to cyber attacks is a fundamental challenge [30], [31], [32], [33].The general public trepidation towards e-healthcare is mainly due to privacy and security issues [30], [34]. Whereas privacy is concerned with the protection of the collected patients' data that can uniquely identify them, security is concerned with the restriction and authorization during access to this personal information [35].…”
Section: Figurementioning
confidence: 99%
“…It uses PUF Physical Unclonable Function (PUF) and Elliptic Curve Cryptography (ECC). The PUF provides secure authentication [65], [66], [67] between the server and the tag, while ECC does the encryption of PUF information. The result is a lightweight authentication scheme.…”
Section: Security In Big Data Healthcarementioning
confidence: 99%
“…Unfortunately, the proposed method cannot be extended or generalized to cover further genomic sequences other than protein testing of this paperwork, since the HT-NGH method has been applied on protein only, similar to pairwise sequence alignment based on transition probability between two consecutive pairs of residues [61] as well as rigid region pairwise sequence alignments [62]. The work can further involve engineering Hash functions [63] combined with partitioning of watermarking via counting-based secret sharing [64] as for semicomplete text reliability [65] aiming innovative researches. Accordingly, the proposed computational protein alignment utilizing hyper threading multi-core sharing technology method needs to be extended precisely for other genomic sequences, which are still open research applicable to give independent supplementary remarks.…”
Section: Possible Extension To Genomic Sequencesmentioning
confidence: 99%