Implementation Towards Enhanced Visual Proof of Identity: Keystroke Tracking-Robust System with Dual-Keypad Security
Shradha Pandule1, Akshada Ringe2, Jaid Sayyed3, Prof. S. C. Puranik4
1,2,3 Students and 4Prof. of Department of Computer Engineering,
Vishwabharti Academy’s College of Engineering, Ahmednagar, Maharashtra-414201
________________________________________________________________________________________________________
Abstract: - The project focuses on developing an advanced authentication mechanism to counteract the growing threat of keylogging attacks. Keylogging, a type of cyber-attack that captures keystrokes to steal sensitive information, poses a significant risk to traditional authentication methods that rely on keyboard input. This project introduces a novel security approach combining two key innovations: a dual-keypad input system and a visual authentication protocol. The dual-keypad system consists of two separate input keypad (Normal Keypad and Virtual Keypad), each responsible for a different aspect of the authentication process. This separation complicates the ability for keyloggers to capture complete authentication sequences, thereby enhancing security.
Simultaneously, the visual authentication component introduces a dynamic, graphical verification process that complements the dual-keypad system. Users interact with visual elements—such as images or patterns—displayed on a screen, which are not susceptible to keylogging. This adds an additional layer of authentication that is both user-friendly and resistant to data capture by malicious software. The integration of these two systems creates a multi-layered defense strategy. The dual-keypad mechanism reduces the risk of compromised keystrokes, while the visual authentication process ensures that even if keystrokes are captured, the authentication remains secure. The project aims to deliver a robust, secure, and intuitive authentication solution that enhances protection against keylogging and other cyber threats, providing a reliable means of securing sensitive information in various applications.
Keywords- Keylogging, Visual Authentication, Dual-Keypad System, Cybersecurity, Authentication Protocols, Secure Input Methods, Data Protection, Multi-Factor Authentication, User Authentication, Security Systems, etc