The Automated System For General Administration Using QR Code

Authors

  • Prof.D.S.Zingade Computer Department, AISSMS Institute of Information Technology
  • Swati Shirsat Computer Department, AISSMS Institute of Information Technology
  • Ankita Varade -
  • Mansi Sable -
  • Vishal.Jangade -

Keywords:

Keylogging; Authentication; QR Code; Two Protocals.

Abstract

The keystroke logging is referred to as keylogging in which the steokes of keyboard are captured, which
means that the keys pressed on the keyboard are recorded. Except this the action of the person are observed and which
are unknown to the person. There are various kinds of rootkits which are present in PC's and the user behaviour is been
observed which make PC's untrusted device. When we need to focus on large network computer security is main subject
of concern. There are large number of keylog methods that rangesfrom hardware and software methods to acoustic
analysis. Fortunately there are preventive measures to search and destroy keyloggers or keep them at bay these we can
keep away ourself from malware attacks as well as shoulder suffering attacks we implemented sophisticated method for
security using QR code. Here we have demonstrated two protocols for visual authentication purpose which are term as
OTP based protocol and password based protocol. Here we show how visualization can improve security as well as
convenience by proposing two visual verification convention, one for password based authentication other one is one
time password.

Published

2022-08-23

How to Cite

Prof.D.S.Zingade, Swati Shirsat, Ankita Varade, Mansi Sable, & Vishal.Jangade. (2022). The Automated System For General Administration Using QR Code . International Journal of Advance Engineering and Research Development (IJAERD), 4(16), -. Retrieved from https://ijaerd.org/index.php/IJAERD/article/view/6185