1 Affiliation : Assiatnt Professor, Department of Computer Science & Engg., P.R.Pote C.O.E. & M
Email : Amravati firstname.lastname@example.org
2 Affiliation : Associate Professor, Department of Computer Science & Engg., G.H.Raisoni Academy of Engg. & Tech, Nagpur
Email : email@example.com
In this era of digitization where literally everything is available at the tip of the finger. Huge amount of data used to flow day in day out, where users used to work with various applications like internet websites, cloud applications, various data servers, web servers, etc. This paper provide idea about access control or authentication used to be acting as first line of defense for preserving data secrecy and its integrity, so far it is learned that the usual login password based methods are easy to implement and to use as well but it is also observed that they are more subjected to be get attacked therefore to preserve authentication on the basis of simple alphanumeric passwords is a challenging task now a days. Hence new methods which bring more strength for authentication and access control are so very expected and desirable.
Strong password , Image pool , access control , authentication , Image Fusion , Visual Key Cryptography
 Zhenfeng Shao, Jiajun Cai, “Remote Sensing Image Fusion With Deep Convolutional Neural Network”, IEEE Transactions on Applied Earth Observations And Remote Sensing, DOI 10.1109,ISSN: 1939-1404, 2018.
 Sadiq Almuairfi, Parakash Veeraraghavan and Naveen Chilamkurti, “IPAS: Implicit Password Authentication System”, IEEE International Conference on Advanced Information Networking and Applications, 2011.
 Hung-Min Sun, Yao-Hsin Chen, and Yue-Hsun Lin, “oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks”, vol 7, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, April 2012.
 Forouzan and Mukhopadhyay “Cryptography & Network Security”, McGraw Hill India Press, 2010, pp 381-383.
 Bin Yu, Xiaohui Xu, Liguo Fang “Multi-secret Sharing Threshold Visual Cryptography Scheme”, IEEE International Conference on Computational Intelligence and Security Workshops, 2007.
 Xiaotian Wu and Wei Sun, “Generalized Random Grid and Its Applications in Visual Cryptography”, IEEE Transactions On Information Forensics And Security, VOL. 8, NO. 9, SEPTEMBER 2013.
 Yanyan Han, Wencai He, Shuai Ji, Qing Luo, “A Digital Watermarking Algorithm of Color Image based on Visual
Cryptography and Discrete Cosine Transform”, International Conference on P2P, Parallel, Grid, Cloud and InternetComputing2014.
 Ajay B. Gadicha ,M.V. Sarode "A Review on Video Security Using Visual Cryptosystem" Journal Procedia Computer Science ,Volume 78 Issue C, March 2016 Pages 729-733..
 Mr. Ajay B Gadicha, Dr. M.V.Sarode, Dr. V.M.Thakare, "Design Prognostic Framework for Scene Classification in VideoProcessing" International Conference on Physics and Photonics Processes in Nano SciencesJournal of Physics: Conference Series1362 (2019).
 Ajay B Gadicha ; M.V. Sarode ; V.M. Thakare, "Aggregating and Searching frame in Video Using Semantic Analysis" 2018 International Conference on Advanced Computation and Telecommunication (ICACAT) 28-29 Dec. 2018.
 Dougal Maclaurin.Modeling, Inference and Optimization with Composable DifferentiableProcedures. PhD thesis, Harvard University, April 2016.
 Ajay B Gadicha, M V Sarode and V M Thakare, "Mechanism of Recognizing Key Frames and Scene in Video Using SFT and Classifier Algorithm" Series: Volume 8 Issue 2"Guru Nanak Publications ISSN: 2249-9946.
 Ajay B. Gadicha ; M.V. Sarode ; V.M. Thakare," Empirical Approach Towards Video Analysis Using Shot Frontier Detection and Key-Frame Mining" IEEE 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS).
 Vijay B Gadicha ; A. S. Alvi, "Extensive Approach for Strong Password Generation Using Content-Color Mechanism" 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA).
 Vijay B. Gadicha , A. S. Alvi "A Novel Approach towards Authentication by Generating Strong Passwords" Proceeding ICTCS '16 Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies