Abstract— The developments in the
information technology has led the modern world to rely on the internet for
digital information. People around the world depend on the internet for every
information from general information to sharing confidential data over the
network. Technology has grown so wide that even all the transactions are
happening through online platforms. Along with this, there has been a rise in
the security threats of the user’s confidential data which are shared by the
users while buying goods online. To maintain the security there are many
authentication techniques available today like OTP, CAPTCHA etc. These security
measures taken till now have been adequate till the present day but over time
the hackers would find out ways to attack. Data breaches and hacking of user
data would increase day by day if preventive measures are not taken time to
time. This project focuses on providing security to the user’s confidential
data with a two way authentication technique. The aim of the project is to
include one more security level to the existing online transaction system. The
visual cryptographic method is used along with the OTP generating system.
Subscribe to:
Post Comments (Atom)
The lineage of Data Objects with transformations on CIA: C- confidentiality I- Integrity A- Availability.
The above figure elucidates the basic transformations among the data objects taken from their origin to the current state. Perha...

-
Abstract — The developments in the information technology has led the modern world to rely on the internet for digital information. Peo...
-
It is with the advancement of overwhelming wireless internet access in mobile environments, users and usage data has become huge and volumi...
-
Estimating and attempting to overcome congestion in high radix topologies that use global adaptive routing decisions will have a great impa...
No comments:
Post a Comment