Remote Authentication using Face Recognition with Steganography
Nishant Kaushik1, Parveen Sultana H2, Senthil Jayavel3
1Nishant Kaushik, Kumaraguru College of Technology, (Tamil Nadu), India.
2Parveen Sultana H, Kumaraguru College of Technology, (Tamil Nadu), India.
3Senthil Jayavel, Kumaraguru College of Technology, (Tamil Nadu), India.
Manuscript received on 14 December 2018 | Revised Manuscript received on 25 December 2018 | Manuscript Published on 09 January 2019 | PP: 351-354 | Volume-7 Issue-4S November 2018 | Retrieval Number: E1991017519/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In today’s world securing data from the hackers and other unauthorized attackers is a critical task. Almost all the system has some kind of authentication which allows the user to access their data. Most of these system are limited to one layer of security like textual passwords. The authentication using textual password is famous as it is straightforward. But the simplicity comes at the cost of vulnerability. These authentication methods are prone to spyware and dictionary attacks. As the systems are becoming more powerful than ever, it is easy to launch a dictionary attack. Another form of attack is to monitor the request and response between the client and server. It is possible when the attacker has gained physical access to the communication medium. Intruder just has to analyze the packets to figure out the delicate information such as password. There are many networks that cannot afford any kind of breach. Steganography, the art of hiding the existence of message by embedding the secret message into another medium, can be exploited in authentication system. Steganography has emerged as technology with various applicationwhich introduced steganalysis, the process to detect the hidden information. The user has to undergo face recognition as well as textual authentication. Since any of the request and response between server and client will not have password in plain text form, it is not possible to breach the password. The system is combination of face recognition and steganography.
Keywords: Remote Authentication, Steganography, Cryptography.
Scope of the Article: Remote Sensing