Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/4121
Title: | Enhancing Data Protection and User Verification in Password Management Systems through Integrated Steganography and Cryptographic systems |
Authors: | Perera, G.D.M |
Keywords: | Cryptography Blockchain Technology Encryption Authentication Security |
Issue Date: | Dec-2024 |
Publisher: | SLIIT |
Abstract: | This research introduces a hybrid authentication system that combines decentralized and centralized security methods, leveraging cryptographic and steganographic techniques to create a secure and user-friendly solution. The system provides users with dual authentication options: a blockchain wallet seed phrase or a novel image-based approach. In registration, a public-private key pair is generated, with the public key stored centrally and private key retrieval enabled through memory-based questions and steganography. The login process offers flexibility, allowing users to either input a seed phrase or answer questions related to an uploaded image. This hybrid model optimizes security by balancing decentralized security with the familiarity of centralized elements, addressing issues like usability, memory retention, and cognitive load. Furthermore, evaluations show that graphical and question-based authentication methods are more intuitive and memorable than traditional passwords, thus reducing recall errors and enhancing security in practical applications. This system provides a significant advancement in secure and adaptable authentication, suitable for various user preferences and ensuring robust data protection. |
URI: | https://rda.sliit.lk/handle/123456789/4121 |
Appears in Collections: | 2024 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Enhancing Data Protection and User Verification in Password Management Systems1-10.pdf | 166.73 kB | Adobe PDF | View/Open | |
Enhancing Data Protection and User Verification in Password Management Systems.pdf Until 2050-12-31 | 2.94 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.