Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Pixel Value Graphical Password Scheme

View through CrossRef
Pixel value access control (PVAC) was introduced to deliver a secure and simple graphical password method where it requires users to load their image as their password. PVAC extracts the image to obtain a three-octet 8-bits Red-Green-Blue (RGB) value as its password to authenticate a user. The pixel value must be matched with the record stored in the database or otherwise, the user is failed to authenticate. However, users which prefer to store images on cloud storage would unintentionally alter and as well as the pixel value due to media compression and caused faulty pixels. Thus, the K-Means clustering algorithm is adapted to fix the issue where the faulty pixel value would be recognized as having the same pixel value cluster as the original. However, most of K-Means algorithm works were mainly developed for content-based image retrieval (CBIR) which having opposite characteristics from PVAC. Thus, this study was aimed to investigate the crucial criteria of PVAC and its compatibility with the K-Means algorithm for the problem. The theoretical analysis is used for this study where the suitable characteristics of K-Means are analyze based on PVAC requirements. The compliance analysis might become a referencing work for digital image clustering techniques adaptation on security system such as image filtering, image recognition, and object detection since most of image clustering works was focused on less sensitive image retrieval.
Title: Pixel Value Graphical Password Scheme
Description:
Pixel value access control (PVAC) was introduced to deliver a secure and simple graphical password method where it requires users to load their image as their password.
PVAC extracts the image to obtain a three-octet 8-bits Red-Green-Blue (RGB) value as its password to authenticate a user.
The pixel value must be matched with the record stored in the database or otherwise, the user is failed to authenticate.
However, users which prefer to store images on cloud storage would unintentionally alter and as well as the pixel value due to media compression and caused faulty pixels.
Thus, the K-Means clustering algorithm is adapted to fix the issue where the faulty pixel value would be recognized as having the same pixel value cluster as the original.
However, most of K-Means algorithm works were mainly developed for content-based image retrieval (CBIR) which having opposite characteristics from PVAC.
Thus, this study was aimed to investigate the crucial criteria of PVAC and its compatibility with the K-Means algorithm for the problem.
The theoretical analysis is used for this study where the suitable characteristics of K-Means are analyze based on PVAC requirements.
The compliance analysis might become a referencing work for digital image clustering techniques adaptation on security system such as image filtering, image recognition, and object detection since most of image clustering works was focused on less sensitive image retrieval.

Related Results

Pixel Value Graphical Password Scheme: Identifying Design Features and Requirements
Pixel Value Graphical Password Scheme: Identifying Design Features and Requirements
Pixel value graphical password scheme was introduced with the aim to solve problems faced by users during authentication process that arising from current graphical password scheme...
An Enhanced Graphical Password Technique Using Fake Pointers
An Enhanced Graphical Password Technique Using Fake Pointers
Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset, such as person, community, nation, or organization. Thus, the det...
Aplikasi Pengukuran Kekuatan dan Rekomendasi Password Berdasarkan Input Pengguna dengan Metode Entropi
Aplikasi Pengukuran Kekuatan dan Rekomendasi Password Berdasarkan Input Pengguna dengan Metode Entropi
Penelitian ini mengembangkan aplikasi berbasis Python untuk mengevaluasi kekuatan password serta memberikan rekomendasi password yang lebih aman menggunakan alfabet fonetik NATO, T...
Efficient Plain Password Cryptanalysis Techniques
Efficient Plain Password Cryptanalysis Techniques
In this research work, some low complexity and efficient cryptanalysis approaches are proposed to decrypt password (encryption keys). Passwords are still one of the most common mea...
Usability Study on Textual and Graphical Passwords
Usability Study on Textual and Graphical Passwords
One of the most common methods used for authentication are passwords, in particular textual passwords. However, maintaining multiple textual passwords across various websites or in...
Organizational Password Policy
Organizational Password Policy
The purpose of this chapter is to provide an overview of password policy. It specifically identifies some basic elements of password policy, password and password policy life cycle...
Organizational Password Policy
Organizational Password Policy
The purpose of this chapter is to provide an overview of password policy. It specifically identifies some basic elements of password policy, password and password policy life cycle...
Graphical-based password for user authentication in internet of things
Graphical-based password for user authentication in internet of things
Internet of Things has become a significant and evolving technology that cannot be avoidable in most of the sectors. However, the Internet of Things security became a concern due t...

Back to Top