IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Efficient Password Mechanism to Overcome Spyware Attack: Quantum Network and AI

Efficient Password Mechanism to Overcome Spyware Attack: Quantum Network and AI
View Sample PDF
Author(s): Ajith Peter Vianney R. (Sathyabama Institute of Science and Technology, India), S. Manikandan (Sathyabama Institute of Science and Technology, India)and A. C. Santha Sheela (Sathyabama Institute of Science and Technology, India)
Copyright: 2025
Pages: 14
Source title: Multidisciplinary Applications of AI and Quantum Networking
Source Author(s)/Editor(s): Christo Ananth (Samarkand State University, Uzbekistan), Osamah Ibrahim Khalaf (Al-Nahrain University, Iraq)and Jose Anand (KCG College of Technology, India)
DOI: 10.4018/979-8-3693-9336-9.ch005

Purchase

View Efficient Password Mechanism to Overcome Spyware Attack: Quantum Network and AI on the publisher's website for pricing and purchasing information.

Abstract

This study enhances existing authentication systems that use one-time passwords (OTP) and personal identification numbers (PIN) by adding biometric data as a second layer of user authentication. As an alternative to entering the password as normal, users using the recommended method doodle each digit on the touchscreen of the device. The authors conduct a comprehensive evaluation of each handwritten digit's robustness and discriminative ability, along with an assessment of the proposed biometric technique's performance with longer passwords. The e-BioDigit database, comprising handwritten digits 0 through 9, is created using finger input on a mobile device. In summary, the implementation of the suggested technique aimed at enhancing the security of existing PIN and OTP systems has yielded positive outcomes. Specifically, in scenarios where the attacker is already aware of the password, the method demonstrates equal error rates of approximately 4.0%. This stands in stark contrast to traditional PIN and OTP systems, where an impersonation attack would invariably succeed in 100% of cases.

Related Content

Pavithra M. G., Visnu Dharsini S., S. Sudarsan, Durga Prasath J.. © 2025. 16 pages.
Haresh D. Khachariya, R. Augustian Isaac, R. Sasikala, M. Gokilavani. © 2025. 16 pages.
M. Ponnrajakumari, G. Subramanian, S. Porselvan, T. Shabareesh. © 2025. 14 pages.
Chand Kowsik Penta, Ataul Mustafa, Lakshmi Prasanna Vutukuri, Aashish Mehta, Srinivas P. V. V. S., Sasank V. V. S.. © 2025. 14 pages.
Ajith Peter Vianney R., S. Manikandan, A. C. Santha Sheela. © 2025. 14 pages.
K. Sivaprakasan, A. Benita. © 2025. 14 pages.
Jeremy Gideon J., J. Jefrin, S. Dhamodaran. © 2025. 14 pages.
Body Bottom