As such, traditional technology adoption models are unlikely to model password manager adoption accurately. Moreover, adoption requires a deliberate switch away from an existing (manual) password management routine.
Password managers are dissimilar to other kinds of software tools, given that the leakage of the credentials they store could give a hacker access to all the individual's online accounts. Password manager applications have the potential to alleviate password pain and improve password strength, yet they are not widely adopted. Keywords – Cryptography, Substitution Cipher, Modulus Function, Encryption, Decryption, Image Transmission Measurement results using all measuring instruments indicate that the proposed method has very satisfying results and has fast computing.
The TIC TOC function is also used to measure the computing speed of the encryption and decryption process. The quality of the cryptographic method is measured by several measuring instruments such as MSE, PSNR, and SSIM to determine the quality of encryption visually and the perfection of decryption, besides that it is used Entropy, NPCR and UACI to determine the probability of encryption resistance and quality against differential attacks. At the test stage used a standard image that has an RGB color channel as a dataset. The binary key is used to determine the Vigenere or Beaufort process, while the 8-bit key is used for modulus operations based on the Vigenere or Beaufort algorithm.
The first key is a matrix with an 8-bits value and the second key is a matrix with a binary value. The hybrid process is carried out using the help of two randomly generated keys. This study proposes securing digital color images with hybrid substitution cryptographic methods combined with the Vigenere and Beaufort methods. Finally, performance analysis of cover-image and stego-image shows that image quality is preserved in terms of MSE and PSNR A typical password manager uses database to store all login credentials but our proposed approach replaces database with image and stores all login credentials inside an image and in turn providing dual layer security of data that uses combination of both cryptography and steganography in which first layer is to scramble information using Blowfish Algorithm and second layer is insertion of scramble information inside an Image using least significant approach (LSB). This password manager takes login credentials (Email Address & Password) as input from user which is then being encrypted using Blowfish algorithm and finally the cipher is stored inside an image selected by user using LSB (least Significant Bit) Technique.
In this paper, a Password Manager, an Android Application is proposed. Therefore this leads to a challenge of remembering several complex passwords for various applications, something an average human being is not very good at. Computer users are increasingly using password for online accounts, email servers, ecommerce sites, financial services and social media websites and it is always advisable that passwords should be complex and reuse of passwords should be avoided. One example of such sensitive data is password. The data generated by these devices need to be stored and accessed securely. Smart phones are continually becoming smaller, more powerful and can perform variety of tasks.