SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 130
MULTILEVEL AUTHENTICATION USING GPS AND OTP TECHNIQUES
Priyanka R. Tope1
, Pranali R. Raut2
, Swamini B. Dalvi3
, Archana C. Lomte4
1, 2, 3
Student, 4
Assistant Professor, Department of Computer, BSIOTR (W), Maharashtra, India
Abstract
Location based authentication is a new direction in development of authentication techniques in the area of security. In this paper, the
geographical position of user is an important attribute for authentication of user. It provides strong authentication as a location
characteristic can never be stolen or spoofed. As an effective and popular means for privacy protection data hiding in encrypted
image is proposed. In our application we are providing secure message passing facilities for this OTP (One Time Password) and
Steganoghaphy techniques are used. This technique is relatively new approach towards information security.
Keywords: Location based authentication, GPS device, Image encryption, Cryptography, Steganography, and OTP
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
Nowadays, in many papers main discussion is on user’s
location for authentication. Authentication is any process by
which a system verifies the identity of user who wishes access
it. It is normally based on identity of user such as user ID and
password. Authentication is one of the three main processes of
AAA systems (Authentication Authorization Accounting)[1].
Location based authentication is a latest technique for
providing higher security. It provides wireless technologies for
sending secure message. Using location based authentication
we find the user’s geographical position. For this we are using
three factors: Latitude, Longitude, and Altitude. Example of
location based authentication such as Corporate mail, military
area, banking etc.
Consider the example of any social networking site; the
important information about users such as user-name,
password, personal details, etc. is stored in the database. This
database is mostly placed on server which is located at
particular location. Access to this should be granted only when
the person is at geographic position where the particular server
is located. Location Based Authentication not only consider
user ID and password but also take geographical position; thus
leading to higher level security. After successful
authentication, the data that is to be sent and received would
be encrypted. To achieve this Advanced Encryption Standard
(AES) algorithm will be used.
1.1 Steganography
Steganography is the art and science of writing hidden
messages in such way that no one, apart from the sender and
intended recipient, suspects the existence of the message, a
form of security through obscurity.
As access to powerful computers increases, delivering
information with digital data becomes more convenient on the
internet. When these digital data are sensitive-whether text,
image or video-there is concern that the information
To enhance the security of information communication, the
digital data is embedded into other irrelevant products as
secret data. A method call steganography, popularly used with
internet communication [2], embeds secret data in a stego-
image that looks like a photograph. After the stego-image is
transmitted, the authorized receivers recover the secret data
using a spatial scheme, while attackers do not realize that the
stego-image hides secret information at all. The least
significant bits (LSBs) method is a well known steganographic
method. Wang et al. [3] proposed a substitution scheme using
LSBs that improved the stego-image’s quality.
1.2 One Time Password (OTP)
A One Time password (OTP) is a password that is valid for
only one login session or transaction. OTPs provides strong
authentication for remote access such as high level IT
resources, web service, mail server, online transaction. The
most important shortcoming that is addressed by OTPs is that,
the contrast to static password, they are not vulnerable to
replay attacks. On the down side, OTPs are difficult for human
beings to memorize.
2. SYSTEM ARCHITECTURE
This Software will work as a communication medium for the
members of an organization who wants to secure their data
transfer from being stolen. The tool is designed to work on a
network. The one who is going to use the software can work in
any environment condition provides all the tools required
executing the file. The machine on which the operation takes
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 131
place should have basic Windows Operating System (XP/2007
or higher).
In our application we are provides secure message passing
facilities:
1. Secure Authentication
2. Sending message of generated (OTP) password to user
mobile
3. Generation of strong key i.e. one time password
4. Encryption of secure data
5. Embedding in image (interested region)
6. Decryption of data
7. Message sending
Three level authentications is necessary for customer
1. Normal Login
2. OTP (One Time Password)
3. Location Based Login
Fig -1: System Architecture
3. ALGORITHM
In this paper we are using following algorithm:
3.1 AES (Advanced Encryption Standard):
AES algorithm is published in 2001[4]. In this algorithm block
length is limited to 128 bits and the key size is specified to
128, 192 or 256 bits.
Table -1: Key Size
Key size
(words/bytes/bits)
4/16/128 6/24/192 8/32/156
Number of rounds 10 12 14
Expanded key size
(words/byte)
44/176 52/208 60/240
AES Algorithm Steps:
 Substitute Bytes: Plain text will be written in matrix
format. For each byte a new byte will be substituted
and a new matrix will be formed.
 Shift Rows: First row is kept as it is. second row is
shifted left by one column and so on.
 Mix Columns: In mixed column, shift row matrix
will be multiply with another fixed polynomial
matrix to get mixed column matrix
 Add Round Key: Round key is added to the state
using x-or operation
3.2 ROI (Region of Interest):
This algorithm is used for steganography. For this ROI
algorithm is used and the data can be hidden in the region of
interest of the cover image.
ROI Steps:
 Input cover image
 Input text data
 Select ROI region
 Read input cover image
 Get bytes of text data
 Hide data into cover image using ROI
 Generate stego image as a output.
Fig -2: Image Steganography
4. IMPLEMENTATION
In this working phase user have to follow the three login steps
such as textual login, GPS login, and OTP login In first part,
when user perform normal login if it gets fail then user is not
valid but if it will get success then it goes to perform next type
of login i.e. GPS login. In this it get success then it follow the
next type of login is the OTP login. If OTP login gets success
then it perform the operation such as enter data for that we are
going use encryption and ROI steganography and encryption
of data will be takes place. At the server database decryption
of encrypted data will be takes place .Simultaneously GPS
parameter also check if the user is not in valid area then it is
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 132
not a valid user but if user in valid area then data will get
extracted from image then decryption of data will be takes
place and user get original data.
CONCLUSIONS
Location dependant authentication is an additional factor in
providing strong authentication. It gives owner the complete
control of the information that only he has access to. The
software will perform its functions properly only when the
user is within the authorized range. So the software will meet
the all security issues like confidentiality, integrity and so on.
Hence this application will be most suitable for military and
industrial data. The authentication techniques where
theoretically proposed till now.
REFERENCES
[1]. H.Rui, Y.Man, H.Janping, K.Zhigang, and M.Jain,” A
novel service-oriented AAA architecture,” in Personal,
Indoor and Mobile Radio Communications, 2003.
PIMRC 2003. 14th
IEEE Proceedings on, 2003, pp.
2833-2837 vol.3.
[2]. S. Zhen, L. Zhoujun, and D. Wenhua, “Different
approaches for the formal definition of authentication
property, ”in Communications, 2003. APCC 2003.The
9th
Asia-Pacific Conference Communications, 2003,
pp.854-858 Vol.2.
[3]. A. Menezes, P. Van Oorschot, ands. Vanstone.,
Handbook of Applied Cryptography: CRC Press.1997.
[4]. A simplified AES algorithm and its linear and
differential.
[5]. Jhon Justin M, Manimurugan S, “A Survey on Various
Encryption Techniques”, International Journal of Soft
Computing and Engineering(IJSCE)ISSN: 2231 2307,
vol-2, issue-1, March 2012.
[6]. E. Denning and P. F. MacDoran, ” Location-Based
authentication: Grounding cyberspace for better
security”,Computer Fraud and Security,
vol.1996,pp.12-16,1996.
[7]. P.S.Tikamdas and A.El Nahas, ”Direction-Based
proximity detection algorithm for location-based
services”,in Wireless and Optical Communications
Networks,2009. WOCN’09. IFIP International
Conference on,2009,pp.1-5.
[8]. B. Schilit , J. Hong, and M. Gruteser, “Wireless
Location privacy protection”, Computer, vol.36,pp.135-
137, dec 2003.
[9]. Moreland T, “Steganography and Steganalysis”,
Leiden Institute of Advanced Computing Science,
www.liacs.nl/home/tmoerl/privatech.pdf.
BIOGRAPHIES
Priyanka R. Tope, Department Of Computer,
BSIOTR (W), Pune, Maharashtra, India.
Email-id- tope.priyanka123@gmail.com
Pranali R. Raut, Department Of Computer,
BSIOTR (W), Pune, Maharashtra, India.
Email-id- pranaliraut77@gmail.com
Swamini B. Dalvi, Department Of Computer,
BSIOTR (W), Pune, Maharashtra, India.
Email-id- swamini.dalvi7@gmail.com
Prof. Archana C. Lomte, Department Of
Computer, BSIOTR (W), Pune, Maharashtra,
India. Email-id- archanalomte@gmail.com

More Related Content

PDF
Multilevel authentication using gps and otp techniques
PDF
Single sign on mechanism for distributed computing
PDF
Smartphone Remote Detection and Wipe System using SMS
PDF
healthcare supervising system to monitor heart rate to diagonize and alert he...
PDF
verifiable and multi-keyword searchable attribute-based encryption scheme for...
PDF
Improved authentication using arduino based voice
PDF
IRJET - Two Model Biometrics Authentication for Locker System
PDF
Effectiveness of various user authentication techniques
Multilevel authentication using gps and otp techniques
Single sign on mechanism for distributed computing
Smartphone Remote Detection and Wipe System using SMS
healthcare supervising system to monitor heart rate to diagonize and alert he...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
Improved authentication using arduino based voice
IRJET - Two Model Biometrics Authentication for Locker System
Effectiveness of various user authentication techniques

What's hot (20)

PDF
Advancement in Android Authentication System Using Direct Significance Service
PDF
Ijsrdv8 i10355
PDF
IRJET- Two Way Authentication for Banking Systems
PDF
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
PDF
Count based hybrid graphical password to prevent brute force attack and shoul...
PDF
Irjet v7 i4693
PDF
Keystroke Dynamics Authentication with Project Management System
PDF
IRJET- Graphical user Authentication for an Alphanumeric OTP
PDF
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
PDF
IRJET - Smart Doorbell System
PDF
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
PDF
IRJET- Crypto-Currencies How Secure are they?
PDF
Database Security Two Way Authentication Using Graphical Password
PDF
Color based android shuffling pattern lock
PDF
Two Aspect Validation Control Frameworks for Online Distributed Services
PDF
Gs3612141219
PDF
A Review Study on Secure Authentication in Mobile System
PDF
IRJET - Door Lock Control using Wireless Biometric
PDF
Online Signature Authentication by Using Mouse Behavior
PDF
Secure3 authentication for sensitive data on cloud using textual, chessboard ...
Advancement in Android Authentication System Using Direct Significance Service
Ijsrdv8 i10355
IRJET- Two Way Authentication for Banking Systems
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
Count based hybrid graphical password to prevent brute force attack and shoul...
Irjet v7 i4693
Keystroke Dynamics Authentication with Project Management System
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - Smart Doorbell System
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Crypto-Currencies How Secure are they?
Database Security Two Way Authentication Using Graphical Password
Color based android shuffling pattern lock
Two Aspect Validation Control Frameworks for Online Distributed Services
Gs3612141219
A Review Study on Secure Authentication in Mobile System
IRJET - Door Lock Control using Wireless Biometric
Online Signature Authentication by Using Mouse Behavior
Secure3 authentication for sensitive data on cloud using textual, chessboard ...
Ad

Viewers also liked (6)

PDF
Power grid synchronization failure detection and recovery
PDF
Auto synch considerations methods
PPTX
Detecting Power Grid Synchronization Failure on Sensing Frequency or Voltage ...
DOCX
DETECTING POWER GRID SYNCHRONISATION FAILURE ON SENSING BAD VOLTAGE OR FREQUE...
PPT
DETECTING POWER GRID SYNCHRONISATION FAILURE ON SENSING BAD VOLTAGE OR FREQUENCY
PPT
Dg synchronisation process
Power grid synchronization failure detection and recovery
Auto synch considerations methods
Detecting Power Grid Synchronization Failure on Sensing Frequency or Voltage ...
DETECTING POWER GRID SYNCHRONISATION FAILURE ON SENSING BAD VOLTAGE OR FREQUE...
DETECTING POWER GRID SYNCHRONISATION FAILURE ON SENSING BAD VOLTAGE OR FREQUENCY
Dg synchronisation process
Ad

Similar to Multilevel authentication using gps and otp techniques (20)

PDF
Location Based Encryption-Decryption Approach for Data Security
PDF
Generic Authentication System
PPTX
Data hiding in graphical password authentication using combination
DOCX
An exploration of geographic authentication schemes abstract
PDF
IRJET- Multi sharing Data using OTP
PDF
Image encryption approach for security issues
PDF
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
PDF
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
PPTX
secure and authentication using personal device ppt
PDF
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
PDF
Multilevel Security and Authentication System
PDF
Location based authentication new words approch secuirity
PDF
EPLQ:Efficient privacy preserving spatial range query for smart phones
PDF
Security for automation in Internet of Things by using one time password
PDF
An Effective Authentication Method using Improved Persuasive Cued Click Points
DOCX
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
DOCX
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
DOCX
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
DOCX
Location proof
PDF
Location Based Encryption-Decryption Approach for Data Security
Generic Authentication System
Data hiding in graphical password authentication using combination
An exploration of geographic authentication schemes abstract
IRJET- Multi sharing Data using OTP
Image encryption approach for security issues
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
secure and authentication using personal device ppt
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
Multilevel Security and Authentication System
Location based authentication new words approch secuirity
EPLQ:Efficient privacy preserving spatial range query for smart phones
Security for automation in Internet of Things by using one time password
An Effective Authentication Method using Improved Persuasive Cued Click Points
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
Location proof

More from eSAT Journals (20)

PDF
Mechanical properties of hybrid fiber reinforced concrete for pavements
PDF
Material management in construction – a case study
PDF
Managing drought short term strategies in semi arid regions a case study
PDF
Life cycle cost analysis of overlay for an urban road in bangalore
PDF
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
PDF
Laboratory investigation of expansive soil stabilized with natural inorganic ...
PDF
Influence of reinforcement on the behavior of hollow concrete block masonry p...
PDF
Influence of compaction energy on soil stabilized with chemical stabilizer
PDF
Geographical information system (gis) for water resources management
PDF
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
PDF
Factors influencing compressive strength of geopolymer concrete
PDF
Experimental investigation on circular hollow steel columns in filled with li...
PDF
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
PDF
Evaluation of punching shear in flat slabs
PDF
Evaluation of performance of intake tower dam for recent earthquake in india
PDF
Evaluation of operational efficiency of urban road network using travel time ...
PDF
Estimation of surface runoff in nallur amanikere watershed using scs cn method
PDF
Estimation of morphometric parameters and runoff using rs & gis techniques
PDF
Effect of variation of plastic hinge length on the results of non linear anal...
PDF
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Mechanical properties of hybrid fiber reinforced concrete for pavements
Material management in construction – a case study
Managing drought short term strategies in semi arid regions a case study
Life cycle cost analysis of overlay for an urban road in bangalore
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of compaction energy on soil stabilized with chemical stabilizer
Geographical information system (gis) for water resources management
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Factors influencing compressive strength of geopolymer concrete
Experimental investigation on circular hollow steel columns in filled with li...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Evaluation of punching shear in flat slabs
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of operational efficiency of urban road network using travel time ...
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of morphometric parameters and runoff using rs & gis techniques
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of use of recycled materials on indirect tensile strength of asphalt c...

Recently uploaded (20)

PDF
PPT on Performance Review to get promotions
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Welding lecture in detail for understanding
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
Construction Project Organization Group 2.pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Geodesy 1.pptx...............................................
PPTX
web development for engineering and engineering
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
DOCX
573137875-Attendance-Management-System-original
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPT on Performance Review to get promotions
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Foundation to blockchain - A guide to Blockchain Tech
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Model Code of Practice - Construction Work - 21102022 .pdf
Welding lecture in detail for understanding
UNIT 4 Total Quality Management .pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Construction Project Organization Group 2.pptx
bas. eng. economics group 4 presentation 1.pptx
Geodesy 1.pptx...............................................
web development for engineering and engineering
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
573137875-Attendance-Management-System-original
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx

Multilevel authentication using gps and otp techniques

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 130 MULTILEVEL AUTHENTICATION USING GPS AND OTP TECHNIQUES Priyanka R. Tope1 , Pranali R. Raut2 , Swamini B. Dalvi3 , Archana C. Lomte4 1, 2, 3 Student, 4 Assistant Professor, Department of Computer, BSIOTR (W), Maharashtra, India Abstract Location based authentication is a new direction in development of authentication techniques in the area of security. In this paper, the geographical position of user is an important attribute for authentication of user. It provides strong authentication as a location characteristic can never be stolen or spoofed. As an effective and popular means for privacy protection data hiding in encrypted image is proposed. In our application we are providing secure message passing facilities for this OTP (One Time Password) and Steganoghaphy techniques are used. This technique is relatively new approach towards information security. Keywords: Location based authentication, GPS device, Image encryption, Cryptography, Steganography, and OTP ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION Nowadays, in many papers main discussion is on user’s location for authentication. Authentication is any process by which a system verifies the identity of user who wishes access it. It is normally based on identity of user such as user ID and password. Authentication is one of the three main processes of AAA systems (Authentication Authorization Accounting)[1]. Location based authentication is a latest technique for providing higher security. It provides wireless technologies for sending secure message. Using location based authentication we find the user’s geographical position. For this we are using three factors: Latitude, Longitude, and Altitude. Example of location based authentication such as Corporate mail, military area, banking etc. Consider the example of any social networking site; the important information about users such as user-name, password, personal details, etc. is stored in the database. This database is mostly placed on server which is located at particular location. Access to this should be granted only when the person is at geographic position where the particular server is located. Location Based Authentication not only consider user ID and password but also take geographical position; thus leading to higher level security. After successful authentication, the data that is to be sent and received would be encrypted. To achieve this Advanced Encryption Standard (AES) algorithm will be used. 1.1 Steganography Steganography is the art and science of writing hidden messages in such way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. As access to powerful computers increases, delivering information with digital data becomes more convenient on the internet. When these digital data are sensitive-whether text, image or video-there is concern that the information To enhance the security of information communication, the digital data is embedded into other irrelevant products as secret data. A method call steganography, popularly used with internet communication [2], embeds secret data in a stego- image that looks like a photograph. After the stego-image is transmitted, the authorized receivers recover the secret data using a spatial scheme, while attackers do not realize that the stego-image hides secret information at all. The least significant bits (LSBs) method is a well known steganographic method. Wang et al. [3] proposed a substitution scheme using LSBs that improved the stego-image’s quality. 1.2 One Time Password (OTP) A One Time password (OTP) is a password that is valid for only one login session or transaction. OTPs provides strong authentication for remote access such as high level IT resources, web service, mail server, online transaction. The most important shortcoming that is addressed by OTPs is that, the contrast to static password, they are not vulnerable to replay attacks. On the down side, OTPs are difficult for human beings to memorize. 2. SYSTEM ARCHITECTURE This Software will work as a communication medium for the members of an organization who wants to secure their data transfer from being stolen. The tool is designed to work on a network. The one who is going to use the software can work in any environment condition provides all the tools required executing the file. The machine on which the operation takes
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 131 place should have basic Windows Operating System (XP/2007 or higher). In our application we are provides secure message passing facilities: 1. Secure Authentication 2. Sending message of generated (OTP) password to user mobile 3. Generation of strong key i.e. one time password 4. Encryption of secure data 5. Embedding in image (interested region) 6. Decryption of data 7. Message sending Three level authentications is necessary for customer 1. Normal Login 2. OTP (One Time Password) 3. Location Based Login Fig -1: System Architecture 3. ALGORITHM In this paper we are using following algorithm: 3.1 AES (Advanced Encryption Standard): AES algorithm is published in 2001[4]. In this algorithm block length is limited to 128 bits and the key size is specified to 128, 192 or 256 bits. Table -1: Key Size Key size (words/bytes/bits) 4/16/128 6/24/192 8/32/156 Number of rounds 10 12 14 Expanded key size (words/byte) 44/176 52/208 60/240 AES Algorithm Steps:  Substitute Bytes: Plain text will be written in matrix format. For each byte a new byte will be substituted and a new matrix will be formed.  Shift Rows: First row is kept as it is. second row is shifted left by one column and so on.  Mix Columns: In mixed column, shift row matrix will be multiply with another fixed polynomial matrix to get mixed column matrix  Add Round Key: Round key is added to the state using x-or operation 3.2 ROI (Region of Interest): This algorithm is used for steganography. For this ROI algorithm is used and the data can be hidden in the region of interest of the cover image. ROI Steps:  Input cover image  Input text data  Select ROI region  Read input cover image  Get bytes of text data  Hide data into cover image using ROI  Generate stego image as a output. Fig -2: Image Steganography 4. IMPLEMENTATION In this working phase user have to follow the three login steps such as textual login, GPS login, and OTP login In first part, when user perform normal login if it gets fail then user is not valid but if it will get success then it goes to perform next type of login i.e. GPS login. In this it get success then it follow the next type of login is the OTP login. If OTP login gets success then it perform the operation such as enter data for that we are going use encryption and ROI steganography and encryption of data will be takes place. At the server database decryption of encrypted data will be takes place .Simultaneously GPS parameter also check if the user is not in valid area then it is
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 132 not a valid user but if user in valid area then data will get extracted from image then decryption of data will be takes place and user get original data. CONCLUSIONS Location dependant authentication is an additional factor in providing strong authentication. It gives owner the complete control of the information that only he has access to. The software will perform its functions properly only when the user is within the authorized range. So the software will meet the all security issues like confidentiality, integrity and so on. Hence this application will be most suitable for military and industrial data. The authentication techniques where theoretically proposed till now. REFERENCES [1]. H.Rui, Y.Man, H.Janping, K.Zhigang, and M.Jain,” A novel service-oriented AAA architecture,” in Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 14th IEEE Proceedings on, 2003, pp. 2833-2837 vol.3. [2]. S. Zhen, L. Zhoujun, and D. Wenhua, “Different approaches for the formal definition of authentication property, ”in Communications, 2003. APCC 2003.The 9th Asia-Pacific Conference Communications, 2003, pp.854-858 Vol.2. [3]. A. Menezes, P. Van Oorschot, ands. Vanstone., Handbook of Applied Cryptography: CRC Press.1997. [4]. A simplified AES algorithm and its linear and differential. [5]. Jhon Justin M, Manimurugan S, “A Survey on Various Encryption Techniques”, International Journal of Soft Computing and Engineering(IJSCE)ISSN: 2231 2307, vol-2, issue-1, March 2012. [6]. E. Denning and P. F. MacDoran, ” Location-Based authentication: Grounding cyberspace for better security”,Computer Fraud and Security, vol.1996,pp.12-16,1996. [7]. P.S.Tikamdas and A.El Nahas, ”Direction-Based proximity detection algorithm for location-based services”,in Wireless and Optical Communications Networks,2009. WOCN’09. IFIP International Conference on,2009,pp.1-5. [8]. B. Schilit , J. Hong, and M. Gruteser, “Wireless Location privacy protection”, Computer, vol.36,pp.135- 137, dec 2003. [9]. Moreland T, “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/tmoerl/privatech.pdf. BIOGRAPHIES Priyanka R. Tope, Department Of Computer, BSIOTR (W), Pune, Maharashtra, India. Email-id- tope.priyanka123@gmail.com Pranali R. Raut, Department Of Computer, BSIOTR (W), Pune, Maharashtra, India. Email-id- pranaliraut77@gmail.com Swamini B. Dalvi, Department Of Computer, BSIOTR (W), Pune, Maharashtra, India. Email-id- swamini.dalvi7@gmail.com Prof. Archana C. Lomte, Department Of Computer, BSIOTR (W), Pune, Maharashtra, India. Email-id- archanalomte@gmail.com