Professional Documents
Culture Documents
Abstract — The keystroke logging is referred to another information is secured. Key loggers are of
as key logging in which the strokes of keyboard are different types: hardware and software key logger
captured, which means that the keys pressed on the devices, monitors the physical keystroke of computer
keyboard are recorded. Except this the action of the users. There are some key loggers who can record the
person are observed and which are unknown to the URL sites and also the mail address. In the act of key
person. There are various kinds of root kits which logger. The password of the user is being known
are present in PC's and the user behavior is been whenever the person sign-in for any purpose. Such a
observed which make PC's entrusted device. When key loggers are also present in personal computers.
we need to focus on large network computer security There are many situation where we have to use public
is main subject of concern. There are large number computers for transaction or any other purpose, so in
of key log methods that ranges from hardware and this case the password is most likely to be stolen, to
software methods to acoustic analysis. Fortunately avoid this act of hacking password. We can propose a
there are preventive measures to search and destroy visual keyboard, which consists of shuffled keypad.
key loggers or keep them at bay these we can keep Whenever a user sign’s in shoulder suffering attack may
away our self from malware attacks as well as occur to prevent this attack. Shuffled visual keypad
shoulder suffering attacks we implemented technique is proposed. There are many other technique
sophisticated method for security using QR code. to prevent this attack. In this paper, we have proposed a
Here we have demonstrated two protocols for visual system which make use of two protocols: one is one
authentication purpose which are term as OTP time password and other is password based
based protocol and password based protocol. Here authentication. We have also shown visualization can
we show how visualization can improve security as improve security.
well as convenience by proposing two visual
verification convention, one for password based OBJECTIVE
authentication other one is one time password. New scheme for detecting QR code generation.
To identify user information and then decrypt
Keywords- Key logging; Authentication; QR QR and send to particular user.
Code; Two Protocols.
To reduce time required for verified certificate.
INTRODUCTION Minimize the effort required for filling the
form
Computer security is the crucial factor which is to be
considered with respective to large networks. Computer LITERATURE SURVEY
security is also known as cyber security, is nothing but
securing the information from thefts or any other Designing Leakage-Resilient Password Entry On Touch
malware attack. A key logger is a type of software that screen Mobile Devices, Author Q. Ya. Han, Y. Li, J.
is considered as spyware which has the ability to record Zhou, and R.H. Deng n, J,2013 In this paper, we
the keystroke after pressing the keys. Any e-mail propose a user authentication scheme named cover-pad
information and messages can be recorded at anytime for password entry on touch screen mobile devices.
by the key logger. Key logger tool is mostly used by the The Quest to Replace Passwords: A Framework for
employers who make use of computer in banking Comparative Evaluation of Authentication Schemes,
system, hospitality to make sure that their password or Authors J. Bonneau, C. Herley, P.C. Van Web
Oorschot, and F. Stajano 2012 Authors have evaluated
RESULT
We provided users data and information which is
needed for generation for particular document for which
QR Code is being generated and verified by the
administrator for which the following result is
generated.
In this paper, we proposed and analyze the use of two [ 8 ]"Toward Snoop-based Kernel Integrity
visual authentication protocols, to show how Monitor"Hyungon Moon,Hojoon LeeJihoon ,
visualization can improve the security and overcome LeeKihwan Kim, Yunheung Paek,Brent Byunghoon
attack using key logger technique. Moreover, we have Kang
shown protocols that only reduces the attacks but also
improves the users experience. Here we have used [ 9 ] 11. H. Yin, D. Song, M. Egele, C. Kruegel, and E.
android application for keyloggger and QR code which Kirda, Panorama: Capturing System-Wide Information
provides potential and feasibility in real world. For Flow for Malware Detection and Analysis, Proc. ACM
future scope our system can be extended in many Conf. Computer and Comm. Security (CCS), 2007.
direction for the future work.
[ 10 ]"YAGP: Yet Another Graphical Password
Strategy" Haichang Gao, Xuewu Guo, Xiaoping Chen,
REFERENCES Liming Wang, and Xiyang Liu
[1]4. J. Bonneau, C. Herley, P.C. Van Web Oorschot,
and F. Stajano, The Quest to Replace Passwords: A
Framework for Comparative Evaluation of
Authentication Schemes, Proc. IEEE Symp. Security
and Privacy (SP), pp. 553-567, 2012