Javascript must be enabled to continue!
Pixel Value Graphical Password Scheme
View through CrossRef
Pixel value access control (PVAC) was introduced to deliver a secure and simple graphical password method where it requires users to load their image as their password. PVAC extracts the image to obtain a three-octet 8-bits Red-Green-Blue (RGB) value as its password to authenticate a user. The pixel value must be matched with the record stored in the database or otherwise, the user is failed to authenticate. However, users which prefer to store images on cloud storage would unintentionally alter and as well as the pixel value due to media compression and caused faulty pixels. Thus, the K-Means clustering algorithm is adapted to fix the issue where the faulty pixel value would be recognized as having the same pixel value cluster as the original. However, most of K-Means algorithm works were mainly developed for content-based image retrieval (CBIR) which having opposite characteristics from PVAC. Thus, this study was aimed to investigate the crucial criteria of PVAC and its compatibility with the K-Means algorithm for the problem. The theoretical analysis is used for this study where the suitable characteristics of K-Means are analyze based on PVAC requirements. The compliance analysis might become a referencing work for digital image clustering techniques adaptation on security system such as image filtering, image recognition, and object detection since most of image clustering works was focused on less sensitive image retrieval.
Faculty of Electrical Engineering, Computer Science and Information Technology Osijek
Title: Pixel Value Graphical Password Scheme
Description:
Pixel value access control (PVAC) was introduced to deliver a secure and simple graphical password method where it requires users to load their image as their password.
PVAC extracts the image to obtain a three-octet 8-bits Red-Green-Blue (RGB) value as its password to authenticate a user.
The pixel value must be matched with the record stored in the database or otherwise, the user is failed to authenticate.
However, users which prefer to store images on cloud storage would unintentionally alter and as well as the pixel value due to media compression and caused faulty pixels.
Thus, the K-Means clustering algorithm is adapted to fix the issue where the faulty pixel value would be recognized as having the same pixel value cluster as the original.
However, most of K-Means algorithm works were mainly developed for content-based image retrieval (CBIR) which having opposite characteristics from PVAC.
Thus, this study was aimed to investigate the crucial criteria of PVAC and its compatibility with the K-Means algorithm for the problem.
The theoretical analysis is used for this study where the suitable characteristics of K-Means are analyze based on PVAC requirements.
The compliance analysis might become a referencing work for digital image clustering techniques adaptation on security system such as image filtering, image recognition, and object detection since most of image clustering works was focused on less sensitive image retrieval.
Related Results
Cross-Domain Feature Enhancement-Based Password Guessing Method for Small Samples
Cross-Domain Feature Enhancement-Based Password Guessing Method for Small Samples
As a crucial component of account protection system evaluation and intrusion detection, the advancement of password guessing technology encounters challenges due to its reliance on...
Pixel Value Graphical Password Scheme: Identifying Design Features and Requirements
Pixel Value Graphical Password Scheme: Identifying Design Features and Requirements
Pixel value graphical password scheme was introduced with the aim to solve problems faced by users during authentication process that arising from current graphical password scheme...
An Enhanced Graphical Password Technique Using Fake Pointers
An Enhanced Graphical Password Technique Using Fake Pointers
Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset, such as person, community, nation, or organization. Thus, the det...
Graphical Password Authentication
Graphical Password Authentication
A pattern password is an authentication system that works when a user selects images in a specific sequence displayed on a graphical user interface (GUI). For this reason, the grap...
Machine Learning Based Password Strength Analysis
Machine Learning Based Password Strength Analysis
Passwords, as the most used method of authentication because to its ease of implementation, allow attackers to get access to the accounts owned by others by means of cracking passw...
P‐126: An Introduction to GGRB Virtual Pixel Technology
P‐126: An Introduction to GGRB Virtual Pixel Technology
The constructions of the GGRB virtual pixel and the effect on the display performance are introduced by comparing with that of the Diamond RGBG virtual pixel, a typical virtual pix...
Extraction of Color Information and Visualization of Color Differences between Digital Images through Pixel-by-Pixel Color-Difference Mapping
Extraction of Color Information and Visualization of Color Differences between Digital Images through Pixel-by-Pixel Color-Difference Mapping
A novel method of extracting color information on a pixel-by-pixel basis or by the average of the regions of interest (ROIs) from digital images is proposed and demonstrated using ...
Development of Hash-Based Multi-Factor Password Generating System
Development of Hash-Based Multi-Factor Password Generating System
The use of passwords or passphrases is essential for every internet user. However, users often face a dilemma between choosing simple passwords that are easy to crack and complex p...

