Header menu link for other important links
X
Remote authentication using face recognition with steganography
N. Kaushik, , S. Jayavel
Published in Blue Eyes Intelligence Engineering and Sciences Publication
2019
Volume: 7
   
Issue: 4
Pages: 351 - 354
Abstract
In today’s world securing data from the hackers and other unauthorized attackers is a critical task. Almost all the system has some kind of authentication which allows the user to access their data. Most of these system are limited to one layer of security like textual passwords. The authentication using textual password is famous as it is straightforward. But the simplicity comes at the cost of vulnerability. These authentication methods are prone to spyware and dictionary attacks. As the systems are becoming more powerful than ever, it is easy to launch a dictionary attack. Another form of attack is to monitor the request and response between the client and server. It is possible when the attacker has gained physical access to the communication medium. Intruder just has to analyze the packets to figure out the delicate information such as password. There are many networks that cannot afford any kind of breach. Steganography, the art of hiding the existence of message by embedding the secret message into another medium, can be exploited in authentication system. Steganography has emerged as technology with various applicationwhich introduced steganalysis, the process to detect the hidden information. The user has to undergo face recognition as well as textual authentication. Since any of the request and response between server and client will not have password in plain text form, it is not possible to breach the password. The system is combination of face recognition and steganography. © 2018, Blue Eyes Intelligence Engineering and Sciences Publication. All rights reserved.
About the journal
JournalInternational Journal of Recent Technology and Engineering
PublisherBlue Eyes Intelligence Engineering and Sciences Publication
ISSN22773878