Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 15 , Issue 1 , PP: 352-364, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

FreeHand Sketch based Authenticated Security System based using Damerau-Levenshtein Distance

N. Kesava Rao 1 , G. Srinivas 2 , P. V. G. D. Prasad Reddy 3

  • 1 Department of CS&SE, AU College of Engineering, Andhra University, Visakhapatnam, Department of CSE, NBKRIST, Vidyanagar, Tirupati (Dist), India - (kesavarn@gmail.com)
  • 2 Department of C.S.E., GITAM Deemed to be University, Visakhapatnam, India - (PrasadReddy.vizag@gmail.com)
  • 3 Department of CS&SE, AU College of Engineering, Andhra University, Visakhapatnam, India - ( srinivas.gitam@gmail.com)
  • Doi: https://doi.org/10.54216/JCIM.150128

    Received: April 16, 2024 Revised: June 15, 2024 Accepted: August 18, 2024
    Abstract

    Introducing a ground breaking approach for validation purposes, this document unveils the FreeHand Sketch-based Authentication Security System.  The biggest problem right now is how we protect our information in internet digital environment, which still has certain security flaws.  On-going security methods related to smartphone applications are mostly built with these security features like dotted patterns, biometrics, and iris and face recognition are the trendy methods. However, they are constrained in their own ways. Free-Hand Sketch Model enhances the basic and comparable security in digital accounts. The present research study made an attempt to make it easier in creating Free-Hand sketch passwords for easy remembrance. A simple Free-Hand sketch is an authorized model for the end users to create their own passwords against security attacks. The main methods suggested in this research study is Damerau-Levenshtein Distance (DLD) used to design Free-Hand sketch image processing model.

    Keywords :

    Free-Hand Sketch , Image Sketch Password , Image processing , DLD Methods

    References

    [1]      Cloning SIM Cards Usability Reduction in Mobile Networks”, Mustafa A. Al-Fayoumi, Nidal F, Shilbayeh, J NetwSyst Manage(2014)22:259-279, DOI 10.1007/s10922-013-9299-8.

    [2]       “Forensic SIM Card Cloning Using Authentication Algorithm”, Nuril Anwar, Imam Riadi, Ahmad Luthfi. , Int. J. of Electronics and Information Engineering, Vol 4, No.2, PP. 71-81, June 2016.

    [3]      “An Alternative Method for Understanding User-Chosen Passwords”, Zhixiong Zheng, Haibo Cheng, Zijian Zhang, Yiming Zhaoand Ping Wang. , Hindawi Security and Communication Networks, Volume January, 2018, Article ID 6160125.

    [4]      “Social Engineering Threats and Awareness- A Survey”, Anshul Kumar, Mansi Chaudhary and Nagresh Kumar. , European Journal of Advances in Engineering and Technology, 2015, 2(11): 15-19, ISSN: 2394 - 658X.

    [5]       “Impact of Artificial Gummy Fingers on Fingerprint Systems”, Tsutomu Matsumoto, Hiroyuki Matsumoto, Koji Yamada, Satoshi Hoshino.  Optical Security and Counterfeit Deterrence Techniques IV, Rudolf L. van Renesse, Editor, Proceedings of SPIE Vol. 4677 (2002) © 2002 SPIE · 0277-786X.

    [6]       “Characteristic mining of Mathematical Formulas from Document - A Comparative Study on Sequence Matcher and Levenshtein Distance procedure”, G.AppaRao, G.Srinivas, K.VenkataRao, P.V.G.D. Prasad Reddy,  Volume-6, Issue-4 E-ISSN: 2347-2693, 30th April, 2018.

    [7]       “A Partial Ratio And Ratio Based Fuzzy-Wuzzy Procedure For Characteristics Mining Of Mathematical Formulas From Documents”,       G. AppaRao, G. Srinivas, K. VenkataRao and P.V.G.D. Prasad Reddy. , ISSN: 2229-6956, ICTACT Journal On Soft Computing, July 2018, Volume: 08, ISSUE: 04.

    [8]      “A Heuristic Ranking of Different Characteristic Mining Based Mathematical Formulae Retrieval Models”, K.N.BrahmajiRao, G.Srinivas, P.V.G.D.PrasadReddy,T.Surendra,, International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-9 Issue-1, October 2019.

    [9]       “Mobile phone cloning”, Kareena Bisht, Pragya Chimnani, and Rajveer Marwal., March 2018 | IRE Journals | Volume 1 Issue 9 | ISSN: 2456-8880.

    [10]    “FreeHand Sketch-based Authenticated Security System using Convolutional Neural Network”, S. Amarnadh, P.V.G.D. Prasad Reddy and N.V.E.S. Murthy., International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-9 Issue-2, December, 2019.

    [11]    “FreeHand Sketch-based Authenticated Security System using Levenshtein Distance and Coordinates-Similarity”, S.Amarnadh, P.V.G.D.Prasad Reddy and N.V.E.S.Murthy., International Journal of Scientific & Technology Research (IJSTR) ISSN: 2277 – 8616, Volume-9 Issue-3, March, 2020.

    [12]    “FreeHand Sketch-based Authenticated Security System using Sequence Matcher”, S.Amarnadh, P.V.G.D. Prasad Reddy and N.V.E.S. Murthy., International Journal of Advanced Science and Technology (IJAST) ISSN: 2005-4238, Volume-29 Issue-4, 2020.

    [13]    “Words Versus Pictures: Leveraging the Research on Visual Communication”, Pauline Dewan. The Canadian Journal of Library and Information Practice and Research, Vol 10, No. 1(2015).

    [14]    “Authenticated Security System based on FreeHand Sketch using FuzzyWuzzy Partial Ratio”, N.KesavaRao, G.Srinivas, P.V.G.D.Prasad Reddy, S.Amarnadh, Journal of Theoretical and Applied Information Technology(JATIT), ISSN:1992-8645 , Volume-101 , Issue-22, 30th Nov, 2023. 

    [15]     “Investigation on the Effect of a Gaussian Blur in Image Filtering and Segmentation”, Estevao S. Gedraite, Murielle Hadad. Research Gate Conference Paper, January 2011.

    [16]    “DamerauLevenshtein distance for indonesian spelling correction”, Puji Santosoa, Pundhi Yuliawati, Ridwan Shalahuddin, AjiPrasetya Wibawa, JURNAL INFORMATIKA, ISSN: 1978-0524, Vol. 13, No 2, July 2019, pp. 11-15.

    [17]    “Spelling Correction Application with DamerauLevenshtein Distance to Help Teachers Examine Typographical Error in Exam Test Scripts”, Viny Christanti Mawardi ,Fendy Augusfian , Jeanny Pragantha , and Stéphane Bressan. E3S Web of Conferences, Vol-188, Article No. 00027 (8th Sept, 2020), ICESTI 2019.

    [18]    “A Levenshtein Transpose Distance Algorithm for approximating String Matching”, Meena Malviya, Rajendra Gupta, World Academics Journal of Management, E-ISSN: 2321-905X, Vol.6, Issue.2, pp.01-04, 31st December, 2018.

    [19]    “Damerau-Levenshtein Distance Algorithm Based on Abstract Syntax Tree to Detect Code Plagiarism”, Ahlijati Nuraminah, Abdullah Ammar, Scientific Journal of Informatics, e-ISSN 2460-0040, p-ISSN 2407-7658, Vol. 11, No. 1, 2024.

    Cite This Article As :
    Kesava, N.. , G., . , V., P.. FreeHand Sketch based Authenticated Security System based using Damerau-Levenshtein Distance. Journal of Cybersecurity and Information Management, vol. , no. , 2025, pp. 352-364. DOI: https://doi.org/10.54216/JCIM.150128
    Kesava, N. G., . V., P. (2025). FreeHand Sketch based Authenticated Security System based using Damerau-Levenshtein Distance. Journal of Cybersecurity and Information Management, (), 352-364. DOI: https://doi.org/10.54216/JCIM.150128
    Kesava, N.. G., . V., P.. FreeHand Sketch based Authenticated Security System based using Damerau-Levenshtein Distance. Journal of Cybersecurity and Information Management , no. (2025): 352-364. DOI: https://doi.org/10.54216/JCIM.150128
    Kesava, N. , G., . , V., P. (2025) . FreeHand Sketch based Authenticated Security System based using Damerau-Levenshtein Distance. Journal of Cybersecurity and Information Management , () , 352-364 . DOI: https://doi.org/10.54216/JCIM.150128
    Kesava N. , G. . , V. P. [2025]. FreeHand Sketch based Authenticated Security System based using Damerau-Levenshtein Distance. Journal of Cybersecurity and Information Management. (): 352-364. DOI: https://doi.org/10.54216/JCIM.150128
    Kesava, N. G., . V., P. "FreeHand Sketch based Authenticated Security System based using Damerau-Levenshtein Distance," Journal of Cybersecurity and Information Management, vol. , no. , pp. 352-364, 2025. DOI: https://doi.org/10.54216/JCIM.150128