Keystroke Tracking-Robust System with Dual-Keypad Security

Authors

  • Shradha Pandule Students of Department of Computer Engineering Vishwabharti Academy’s College of Engineering, Ahmednagar, Maharashtra, india. Author
  • Akshada Ringe Students of Department of Computer Engineering Vishwabharti Academy’s College of Engineering, Ahmednagar, Maharashtra, india. Author
  • Jaid Sayyed Students of Department of Computer Engineering Vishwabharti Academy’s College of Engineering, Ahmednagar, Maharashtra, india. Author
  • Prof. S. C. Puranik Prof. of Department of Computer Engineering, Vishwabharti Academy’s College of Engineering, Ahmednagar, Maharashtra, India. Author

DOI:

https://doi.org/10.47392/IRJAEH.2025.0306

Keywords:

Authentication Protocols, Cybersecurity, Dual-Keypad System, Keylogging, Multi-Factor Authentication, Secure Input Methods, Data Protection, User Authentication, Security System, Visual Authentication

Abstract

The development of an advanced authentication mechanism designed to mitigate the increasing risk of keylogging attacks, a prevalent cyber threat that captures keystrokes to steal sensitive information. Traditional authentication methods relying on keyboard input are particularly vulnerable to such attacks. To address this, a novel security framework is introduced, combining two innovative components: a dual-keypad input system and a visual authentication protocol. The dual-keypad system employs two distinct input interfaces—a physical keypad and a virtual keypad—each handling separate aspects of the authentication process. This division significantly complicates the ability of keyloggers to capture complete authentication sequences, thereby enhancing security. Complementing this, the visual authentication component incorporates a dynamic, graphical verification process. Users interact with visual elements, such as images or patterns displayed on a screen, which are inherently resistant to keylogging. This approach not only strengthens security but also ensures a user-friendly experience. Together, these systems form a multi-layered defense strategy. The dual-keypad mechanism minimizes the risk of keystroke compromise, while the visual authentication ensures that even if keystrokes are intercepted, the authentication process remains secure. This research aims to deliver a robust, secure, and intuitive authentication solution that effectively counters keylogging and other cyber threats, offering a reliable method for safeguarding sensitive information across various applications.

Downloads

Download data is not yet available.

Downloads

Published

2025-05-07

How to Cite

Keystroke Tracking-Robust System with Dual-Keypad Security. (2025). International Research Journal on Advanced Engineering Hub (IRJAEH), 3(05), 2098-2102. https://doi.org/10.47392/IRJAEH.2025.0306

Similar Articles

1-10 of 632

You may also start an advanced similarity search for this article.