Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Cyber Security- A New Secured Password Generation Algorithm With Graphical Authentication And Alphanumeric Passwords Along With Encryption, Akash Rao Apr 2019

Cyber Security- A New Secured Password Generation Algorithm With Graphical Authentication And Alphanumeric Passwords Along With Encryption, Akash Rao

Electrical & Computer Engineering Theses & Dissertations

Graphical passwords are always considered as an alternative of alphanumeric passwords for their better memorability and usability [1]. Alphanumeric passwords provide an adequate amount of satisfaction, but they do not offer better memorability compared to graphical passwords [1].

On the other hand, graphical passwords are considered less secured and provide better memorability [1]. Therefore many researchers have researched on graphical passwords to overcome the vulnerability. One of the most significant weaknesses of the graphical passwords is "Shoulder Surfing Attack," which means, sneaking into a victim's computer to learn the whole password or part of password or some confidential information. Such …


3d Wireframe Model Encryption Based On Chaos, Zhao Geng, Shuyun Zhu, Jin Xin, Xiaodong Li, Hongbo Sun, Zhili Xu, Yin Sui, Zhaohui Tian, Sun Nan Jan 2019

3d Wireframe Model Encryption Based On Chaos, Zhao Geng, Shuyun Zhu, Jin Xin, Xiaodong Li, Hongbo Sun, Zhili Xu, Yin Sui, Zhaohui Tian, Sun Nan

Journal of System Simulation

Abstract: With the rapid growth of graphics data in the network environment, the security of graphics data has become a new challenge of network security that needs to be solved urgently. Encryption of 3D models is also urgent. In this paper, an encryption scheme for 3D wireframe model is proposed by using chaos mapping. The method is divided into two parts: confusion and diffuse. A random invertible matrix is generated by using logical mapping to spread the points. The side is scrambled by Arnold's cat map, then the encrypted vertices and polygons are combined to form the final encrypted 3D …