Secure Authentication Using 2 Level Security

Mohankumar Vadlamudi, V Lakshmi Chetana


The customer has to present the share during all of his transactions. This share is stacked with the first to get original image Then decoding method is used to take the hidden password on acceptance or rejection n of the output and authenticate the customer. Another mechanism are used for providing the security, methods like generation of OTP and security question are added for extra safety of user’s transaction. Finally the user will get extra safety measures so that and illegal hack-in and accessing can be prevented.
Keywords: Key logger; Authentication; Malicious attacks; Android smart phones; Keyboard

Full Text:


Copyright (c) 2015 Mohankumar Vadlamudi, V Lakshmi Chetana

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.


All published Articles are Open Access at 

Paper submission: