Impact Factor (2025): 6.9
DOI Prefix: 10.47001/IRJIET
Vol 9 No 5 (2025): Volume 9, Issue 5, May 2025 | Pages: 514-519
International Research Journal of Innovations in Engineering and Technology
OPEN ACCESS | Research Article | Published Date: 12-06-2025
The paper focuses on developing an advanced authentication mechanism to counteract the growing threat of keylogging attacks. Keylogging, a type of cyber-attack that captures keystrokes to steal sensitive information, poses a significant risk to traditional authentication methods that rely on keyboard input.
This paper introduces a novel security approach combining two key innovations: a dual-keypad input system and a visual authentication protocol. The dual-keypad system consists of two separate input keypad (Normal Keypad and Virtual Keypad), each responsible for a different aspect of the authentication process. This separation complicates the ability for key loggers to capture complete authentication sequences, thereby enhancing security.
Simultaneously, the visual authentication component introduces a dynamic, graphical verification process that complements the dual-keypad system. Users interact with visual elements—such as images or patterns—displayed on a screen, which are not susceptible to keylogging. This adds an additional layer of authentication that is both user-friendly and resistant to data capture by malicious software.
The integration of these two systems creates a multi-layered defence strategy. The dual-keypad mechanism reduces the risk of compromised keystrokes, while the visual authentication process ensures that even if keystrokes are captured, the authentication remains secure. The paper aims to deliver a robust, secure, and intuitive authentication solution that enhances protection against keylogging and other cyber threats, providing a reliable means of securing sensitive information in various applications.
Health Record, Telemedicine System, Medicine Management, Diagnosis, Symptoms, Java, MySQL database, Web based Application
Asst. Prof. P. B. Chandane, Omkar Lahane, Ajinkya Makone, Dipali Kshirsagar, Sakshi Kolate. (2025). Securing User Authentication with Visual Cryptography Techniques. International Research Journal of Innovations in Engineering and Technology - IRJIET, 9(5), 514-519. Article DOI https://doi.org/10.47001/IRJIET/2025.905060
This work is licensed under Creative common Attribution Non Commercial 4.0 Internation Licence