Securing User Authentication with Visual Cryptography Techniques

Asst. Prof. P. B. ChandaneDepartment of Computer Engineering, Adsul's Technical Campus, Chas, Maharashtra, IndiaOmkar LahaneDepartment of Computer Engineering, Adsul's Technical Campus, Chas, Maharashtra, IndiaAjinkya MakoneDepartment of Computer Engineering, Adsul's Technical Campus, Chas, Maharashtra, IndiaDipali KshirsagarDepartment of Computer Engineering, Adsul's Technical Campus, Chas, Maharashtra, IndiaSakshi KolateDepartment of Computer Engineering, Adsul's Technical Campus, Chas, Maharashtra, India

Vol 9 No 5 (2025): Volume 9, Issue 5, May 2025 | Pages: 514-519

International Research Journal of Innovations in Engineering and Technology

OPEN ACCESS | Research Article | Published Date: 12-06-2025

doi Logo doi.org/10.47001/IRJIET/2025.905060

Abstract

The paper focuses on developing an advanced authentication mechanism to counteract the growing threat of keylogging attacks. Keylogging, a type of cyber-attack that captures keystrokes to steal sensitive information, poses a significant risk to traditional authentication methods that rely on keyboard input.

This paper introduces a novel security approach combining two key innovations: a dual-keypad input system and a visual authentication protocol. The dual-keypad system consists of two separate input keypad (Normal Keypad and Virtual Keypad), each responsible for a different aspect of the authentication process. This separation complicates the ability for key loggers to capture complete authentication sequences, thereby enhancing security.

Simultaneously, the visual authentication component introduces a dynamic, graphical verification process that complements the dual-keypad system. Users interact with visual elements—such as images or patterns—displayed on a screen, which are not susceptible to keylogging. This adds an additional layer of authentication that is both user-friendly and resistant to data capture by malicious software.

The integration of these two systems creates a multi-layered defence strategy. The dual-keypad mechanism reduces the risk of compromised keystrokes, while the visual authentication process ensures that even if keystrokes are captured, the authentication remains secure. The paper aims to deliver a robust, secure, and intuitive authentication solution that enhances protection against keylogging and other cyber threats, providing a reliable means of securing sensitive information in various applications.

Keywords

Health Record, Telemedicine System, Medicine Management, Diagnosis, Symptoms, Java, MySQL database, Web based Application


Citation of this Article

Asst. Prof. P. B. Chandane, Omkar Lahane, Ajinkya Makone, Dipali Kshirsagar, Sakshi Kolate. (2025). Securing User Authentication with Visual Cryptography Techniques. International Research Journal of Innovations in Engineering and Technology - IRJIET, 9(5), 514-519. Article DOI https://doi.org/10.47001/IRJIET/2025.905060

References
  1. Chandramouli, R., & Memon, N. (2019). "Analysis of LSB based image steganography techniques." Proceedings of the IEEE International Conference on Image Processing, 2001, 3, 1019-1022.
  2. Naor, M., & Shamir, A. (2018). "Visual cryptography." Advances in Cryptology - EUROCRYPT '94, 950, 1-11.
  3. Mishra, A. K., & Singh, S. (2016). "A Review on Image Steganography Techniques." International Journal of Computer Applications, 139(3), 1-5.
  4. Khan, M. A., & Ghosh, S. (2015). "A Survey of Image Steganography Techniques." International Journal of Computer Applications, 111(8), 1-6.
  5. Saha, S., & Gupta, D. (2014). "A New Image Steganography Technique Using Visual Cryptography." International Journal of Advanced Research in Computer Science and Software Engineering, 4(8), 879-883.