Authentication Based on Handwritten Telugu Character Recognition by Integrating Multiple Contexts

Shoba Bindu C*
*Associate Professor, Computer Science and Engineering Department, Jawaharlal Nehru Technological University Anantapur (JNTUA) College of Engineering, India
Periodicity:September - November'2014
DOI : https://doi.org/10.26634/jpr.1.3.3213

Abstract

Authentication is the process of confirming the identity of the user using the passwords in order to prove the user is genuine or valid. The graphical patterns can be used with maximum feasibility to the users, as they are easy to remember and hard to guess by the others. This proposed scheme presents an effective approach for the recognition of unconstrained handwritten Telugu texts as passwords for the purpose of granting the access. The proposed scheme uses a special symbol apart from Telugu characters as password, thus increasing the complexity of the password. The proposed scheme is analyzed for usability and security.

Keywords

Authentication, Passwords, Handwritten Characters, Usability, Security

How to Cite this Article?

Bindu, C. S. (2014). Authentication Based on Handwritten Telugu Character Recognition by Integrating Multiple Contexts. i-manager’s Journal on Pattern Recognition, 1(3), 1-7. https://doi.org/10.26634/jpr.1.3.3213

References

[1]. Qiu-Feng Wang, Fei Yin, and Cheng-Lin Liu, (2012), “Handwritten Chinese Text Recognition by Integrating Multiple Contexts”, IEEE transactions on pattern analysis and machine intelligence, Vol. 34, pp.1469-1481.
[2]. C.V.Chakradhar and C.Shoba Bindu, (2013), “Online Telugu Handwritten Password Authentication Using HMM Based Technique”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), ISSN 2278-6856, Vol. 2.
[3]. Amit Arora and Anoop M. Namboodiri, (2010), "A Hybrid Model for Recognition of Online Handwriting in Indian Scripts”, IEEE International conference on Frontiers in Handwriting Recognition (ICFHR), pp. 433-438.
[4]. MudassarRaza, Muhammad Iqbal, Muhammad Sharif and Waqas Haider Comsats, (2012), “A Survey of Password Attacks and Comparative Analysis of Methods for Secure Authentication”, World Applied Sciences Journal, Vol.19, pp. 439-444.
[5]. V.N. Manjunath Aradhya, S.K. Niranjan, G.Hemantha Kumar, (2010),“Probabilistic Neural Network based Approach for Handwritten CharacterRecognition”, International Conference of ACCTA-2010, pp.3-5.
[6]. Fakhreddine Karray, Milad Alemzadeh, Jamil Abou Saleh and Mo Nours Arab proposed, (2008), “Human- Computer Interaction: Overview on State of the Art”,International Journal on smart sensing and intelligent systems, Vol. 1.
[7]. Mitsuru Nakai, Hiroshi Shimodaira and Shigeki Sagayama, (2003), “Generation of Hierarchical Dictionary for Stroke-order Free Kanji Handwriting Recognition Based on Sub stroke HMM”, ICDAR2003, pp. 514-518.
[8]. Jim Owens and Jeanna Matthews, (2008), “A Study of Passwords and Methods Used in Brute-Force SSH Attacks”, In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET).
[9]. Xiao yuan Suo, Ying Zhu, G. Scott. Owen, (2005), “Graphical Passwords: A Survey ”, Proceedings of Computer Security Applications Conference.
[10]. Farnaz Towhidi, Azizah Abdul Manaf, Salwani MohdDaud, Arash Habibi Lashkari, (2011), “The Knowledge Based Authentication Attacks”, Proceedings of USA WORLDCOMP11 (Inspec /IET).
[11]. Natural Language Processing. (n.d.). In Wikipedia. Retrieved from http:// en.wikipedia.org / wiki / Natural_language_processing
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.