International Conference on Computing, Communication &Amp; Automation 2015
DOI: 10.1109/ccaa.2015.7148490
|View full text |Cite
|
Sign up to set email alerts
|

Strong authentication using dynamic hashing and steganography

Abstract: Now a day's online services became part of our life which performs communication digitally. This digital communication needsconfidentiality and data integrity to protect from unauthorized use. Security can be provided by using two popular methods cryptography and steganography. Cryptography scrambles the message so that it cannot be understood, where as the steganography hides the message in another medium which cannot be detected by normal human eye.This paper introduces a technique which provides high securi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 5 publications
0
0
0
Order By: Relevance
“…The basic objective of authentication is to demonstrate the user's identity through authentication techniques such usernames and passwords, biometric data like fingerprint or facial recognition scans, and phone or text confirmations [14]. The procedure for identity authentication using a login and password (the most popular type of authentication) is as follows:…”
Section: How Authentication Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The basic objective of authentication is to demonstrate the user's identity through authentication techniques such usernames and passwords, biometric data like fingerprint or facial recognition scans, and phone or text confirmations [14]. The procedure for identity authentication using a login and password (the most popular type of authentication) is as follows:…”
Section: How Authentication Workmentioning
confidence: 99%
“…To access a system, single-factor authentication (SFA) or one-factor authentication utilizes a login and password. Although this is the most widely used and recognized type of authentication, it is regarded as having low security [14]. Single-factor authentication just offers one barrier, which is its fundamental flaw.…”
Section: Types Of Authentication 1) Single-factor Authenticationmentioning
confidence: 99%