Professional Documents
Culture Documents
3.prog Report 3 - DST
3.prog Report 3 - DST
Six-Monthly Progress Report of the Research work done for the period from 01-01-2019 to 30-06-2019
of the research scholar.
………………..…………………………….
In this period of six months, the Graphical Authentication System has been understood in terms
of different image operations and techniquespresents a security scheme with the help of
Graphical Password which uses images for authentication purpose. I also Studied& learn
review on Advanced Graphical Authentication that adopted inmyresearch topic to resists
shoulder surfing attacks available while using Textual passwords& their related issues. I also
studied about different Textual passwords are widely used in authentication methods and
Textual passwords related shoulder surfing attacks .etcMost of the system user prefer textual
password in the application of security and privacy for their computer system. However there
will always be a risk of human’s selecting a bad or small password or either in putting them in
the insecure manner are said to be “the weakest process” in the authentication chain.In today’s
world of quick growing technologies, Security play’s a prominent role in the protection of
people’s vital information from varied system attacks. So I found that, provide solution to these
problems there should be some form of authentication protection is required.
After recognising the different security issues its found that rather than selecting a powerful
character set, user tend to select the password which is easier, less complicated, short, or a type
of password which is easy for memorization.So, to resist from different shoulder Surfing
attacks I think to providea proposed idea which uses session password technique through
graphical authentication. In session password user will use new image at every login attempt.
The added image is valid for only single login session.to overcome the problem of shoulder
surfing attack resistant technique is proposed. This technique contains pass-matrixand pass-
point clickingin which more than one images are used to set the password.For every image it
defines the click points as a pass-square.
After studying these operations written paper for National Level Conference on
“Advanced Computing & Data Processing (ACDP-2k19)”
Title of Paper: Review on Decentralized Access Control with Anonymous Authentication
Abstract :Images that can operate on digital cameras or smartphones. Proposes a method for
fusing multiexposedThe proposed method consists of an automatic exposure bracketing
algorithm that determines which exposures to capture and a newly proposed multi-exposure
image fusion algorithm. This fusion algorithm attempts to improve the fusion performance on
the basis of the recently proposed no-reference image quality metrics,and also change the
affects the change noting that the exposure change affects the change in the local luminance
details, contrast, and colourfulness of a pixel. The poor lighting condition and limited dynamic
range of digital imaging device in smartphones and cameras, the recorded images are often
under-/overexposed and with low contrast. we build a largescale multi-exposure image data set,
which contains 589 elaborately selected high-resolution multiexposure sequences with 4,413
images. subjective experiments are conducted to screen the best quality one as the reference
image of each scene. Thirteen representative multi-exposure image fusion in smartphone and
stack-based high dynamic range imaging algorithms are employed to generate the contrast
enhanced images for each sequence for multiexposure images, and. Most of previous single
image contrast enhancement (SICE) methods in smartphones to adjust the tone curve to correct
the contrast of an input image to capture the snap. Those methods, however, often fail in
revealing image details because of the limited information in a single image