Implementation of Secure Authentication Scheme for Mobile Device
Priti Jadhao1, Lalit Dole2
1Priti Jadhao, CSE DEPT, G.H.Raisoni college of engg., Nagpur, India.
2Lalit Dole, CSE DEPT, G.H.Raisoni college of engg., Nagpur, India.
Manuscript received on June 11, 2013. | Revised Manuscript received on June 15, 2013. | Manuscript published on June 25, 2013. | PP: 76-78 | Volume-1 Issue-8, June 2013. | Retrieval Number: H0363061813/2013©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Authentication is a fundamental aspect of system security. It confirms the identity of any user trying to log on to a domain or access network resources. Due to the numerous advantages of authentication systems, it can be used in various applications. The common application involving authentication is, a computer program using a blind credential to authenticate to another program, Using a confirmation E-mail to verify ownership of an e-mail address, using an internet banking system, Withdrawing cash from an ATM .The main purpose of these systems is to validate the user’s right to access the system and information, and protect against identity theft and fraud.
Keywords: Image Processing, Watermarking Techniques,
Walsh code, DCT (Discrete Cosine Transform).