Password Processing Scheme using Enhanced Visual Cryptography and OCR in Hybrid Cloud Environment
Ranjith.R1, Supreeth S2, Ramya R3, Ganesh Prasad. M4, Chaitra Lakshmi L5
1Ranjith R, School of C&IT, REVA University, India.
2Supreeth S, School of C&IT, REVA University, India.
3Ramya R, School of C&IT, REVA University, India.
4Ganesh Prasad M, School of C&IT, REVA University, India.
5Chaitra Lakshmi L, School of C&IT, REVA University, India.
Manuscript received on 05 June 2019 | Revised Manuscript received on 14 June 2019 | Manuscript Published on 29 June 2019 | PP: 150-154 | Volume-8 Issue-5S, May 2019 | Retrieval Number: E10320585S19/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: To authenticate the user using the password can be achieved by simply converting the password into the values is called hash. Even though there are many websites which can unlock the hash values by using some cracking tools called as cyber attacks. This cyber attacks are very much common by the way of hacking the passwords by hackers. Hackers can undeniably figure out the plain text using such software’s it gives n-number of examples of plaintext samples which the hackers can execute and crack open or penetrate into personal information in the Hybrid Cloud Environment. To overcome this type of trouble or mishap our system is recommended. The proposal is that our system not only converts the plaintext into hash values but it will be stored as an image, the user will only be having an ID and login password (at the time of user creation) . The user when he wants to login he will receive an email in which a share-1 image will be present which is encrypted completely even he himself can’t be able to recognize what it is, the server will ask him to download the share-2 image then he has to enter his user ID for the server to recognize his User-ID. Since these images are encrypted both share images 1&2 are encrypted by VC (Visual Cryptography) then the user has to merge these two images, if it matches then only the user can login. This merge method undergoes OCR (0ptical cryptography recognition). Our aim is to prevent hackers from gaining access to personal information of the users in Hybrid Cloud Computing Environment.
Keywords: Visual Cryptography, Optical Character Recognition (OCR), Hybrid Cloud Computing.
Scope of the Article: Cloud Computing