Enviar búsqueda
Cargar
Graphical Password Authentication
•
0 recomendaciones
•
16 vistas
IRJET Journal
Seguir
https://www.irjet.net/archives/V10/i3/IRJET-V10I3197.pdf
Leer menos
Leer más
Ingeniería
Denunciar
Compartir
Denunciar
Compartir
1 de 4
Descargar ahora
Descargar para leer sin conexión
Recomendados
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET Journal
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
IRJET Journal
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
IOSR Journals
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
cscpconf
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
eSAT Publishing House
2 round hybrid password scheme
2 round hybrid password scheme
IAEME Publication
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based Authentication
IRJET Journal
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based Authentication
IRJET Journal
Recomendados
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET Journal
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
IRJET Journal
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
IOSR Journals
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
cscpconf
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
eSAT Publishing House
2 round hybrid password scheme
2 round hybrid password scheme
IAEME Publication
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based Authentication
IRJET Journal
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based Authentication
IRJET Journal
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
IJCSIS Research Publications
Graphical Password by Image Segmentation
Graphical Password by Image Segmentation
IRJET Journal
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
IOSR Journals
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
IJNSA Journal
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
IAEME Publication
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
IJCSIS Research Publications
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
eSAT Publishing House
An Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication System
IJERA Editor
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET Journal
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Password
ijtsrd
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
Ce36484489
Ce36484489
IJERA Editor
Jc2516111615
Jc2516111615
IJERA Editor
Jc2516111615
Jc2516111615
IJERA Editor
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET Journal
Ai4506179185
Ai4506179185
IJERA Editor
Graphical Password Authentication using Images Sequence
Graphical Password Authentication using Images Sequence
IRJET Journal
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
IJMER
Shoulder surfing resistant graphical
Shoulder surfing resistant graphical
Kamal Spring
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
Más contenido relacionado
Similar a Graphical Password Authentication
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
IJCSIS Research Publications
Graphical Password by Image Segmentation
Graphical Password by Image Segmentation
IRJET Journal
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
IOSR Journals
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
IJNSA Journal
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
IAEME Publication
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
IJCSIS Research Publications
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
eSAT Publishing House
An Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication System
IJERA Editor
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET Journal
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Password
ijtsrd
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
Ce36484489
Ce36484489
IJERA Editor
Jc2516111615
Jc2516111615
IJERA Editor
Jc2516111615
Jc2516111615
IJERA Editor
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET Journal
Ai4506179185
Ai4506179185
IJERA Editor
Graphical Password Authentication using Images Sequence
Graphical Password Authentication using Images Sequence
IRJET Journal
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
IJMER
Shoulder surfing resistant graphical
Shoulder surfing resistant graphical
Kamal Spring
Similar a Graphical Password Authentication
(20)
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Graphical Password by Image Segmentation
Graphical Password by Image Segmentation
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
An Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication System
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Password
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
Ce36484489
Ce36484489
Jc2516111615
Jc2516111615
Jc2516111615
Jc2516111615
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
Ai4506179185
Ai4506179185
Graphical Password Authentication using Images Sequence
Graphical Password Authentication using Images Sequence
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
Shoulder surfing resistant graphical
Shoulder surfing resistant graphical
Más de IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Más de IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Último
Research Methodology for Engineering pdf
Research Methodology for Engineering pdf
CaalaaAbdulkerim
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
welding defects observed during the welding
welding defects observed during the welding
MuhammadUzairLiaqat
Virtual memory management in Operating System
Virtual memory management in Operating System
Rashmi Bhat
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
asadnawaz62
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
121011101441
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
aditya806802
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
k795866
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
VelmuruganTECE
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
Amil Baba Dawood bangali
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
jhunlian
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
SAURABHKUMAR892774
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
irfanmechengr
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
KartikeyaDwivedi3
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
Alluxio, Inc.
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Tagore Institute of Engineering And Technology
The SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teams
DILIPKUMARMONDAL6
Último
(20)
Research Methodology for Engineering pdf
Research Methodology for Engineering pdf
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
welding defects observed during the welding
welding defects observed during the welding
Virtual memory management in Operating System
Virtual memory management in Operating System
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
The SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teams
Graphical Password Authentication
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 p-ISSN: 2395-0072 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net Graphical Password Authentication Meher Gulhane, Amey Andurekar, Vaidehi Kute, Achal Maldhure, Sharwari Kale Department of Computer Science Engineering, Sipna College of Engineering & Technology Amravati, Maharashtra, India Professor A.V. Pande Department of Computer Science Engineering, Sipna College of Engineering & Technology Amravati, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Graphical password is one of technic for authentication of computer security. Nowadays digital/computer security is the most important thing in computer science for protecting user or customer data. And Shoulder-surfing is one of the threats where a criminal can steal a password by direct observation or by recording the authentication session. There are several techniques available for this authentication, the most prevalent and simple of which is the Graphical password technique. So, we suggest a new approach to combat this problem. We have developed two concepts to combat shoulder surfing attacks. First, the user must register if the registration does not exist. Second, you must log in with a valid user ID and password. The password is a grouping of characters and numbers. Third, the user has to cross image-based authentication where the user can choose their password and this method has higher chances to offset each other. You should choose a password according to the registration password, it must match at login time. In color base authentication, there should be several color base passwords, and depending on the color, you need to remember the password sequence. And it’s like three-factor authentication. So, here is proposed a new graphical password authentication technique that is resilient to shoulder surfing and also to other types of probable attacks. Keywords: Graphical password, Authentication, Security, Text-based password, Recognition, Pictures 1. INTRODUCTION Authentication is the process of determining that the person requesting a resource is the one who it claims to be. Most authentication system nowadays uses an integration of username and password . The problem with the password is that it requires the user to remember it and it should be kept secret. Each authentication system has its own guidelines and limitations like password length, password must contain alphanumeric and special characters. These passwords are mostly text-based passwords. Either user use passwords that are easy to remember like license plate numbers, parent names, phone numbers sometimes their own name which is very much predictable, or complex passwords that they overlook so they might be using the same password for different accounts or jot down their password somewhere. Moreover, the user is vulnerable to various attacks. Text-based passwords face security and usability matters. To overcome these shortcomings of alphanumeric passwords, graphical password schemes have been proposed. In a graphical password authentication application by using the 6 passports scheme a password contains an image where the user can input the password with the help of mouse events like click and drag. Picture Superiority Effect Theory reveals that pictures can be recognized and recalled easily by the human brain, enhancing the ability to Strong passwords can be invented which are resistant to guessing, dictionary attack, and social engineering. 1.1 Problem Statement An alphanumeric password is an old traditional common authentication method. Practically this traditional method is a too insecure system. For example, an attacker may choose an easily guessed user’s password, if a user is not using a strong password. Users may use the same password for multiple devices or sites. These are all insecure characteristics for normal users. And authentication is one of the important security points where the user has active responsibility for their personal information security. If we use the old traditional password system then there may have the possibility of to dictionary attack, Brute Force Attack. 1.2 Objective ii. To implement the Graphical Password Authentication application using the PassPoint technique 2. LITERATURE REVIEW [1] In Dec 2021 author H. Gao proposed a graphical password scheme using color login. In this color, login uses a background color which decreases login time. The possibility of accidental login is high and the password is too short. The system developed by Sobrado is improved by combining text with images or colors to generate session passwords for authentication. Session passwords can be used only once and every time a new © 2023, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1237 i. To design a Graphical Password Authentication implemented in the mobile application.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 p-ISSN: 2395-0072 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net users may consider wrong password as they are supposed to consider the password in terms of pair . [5] In Graphical password as an OTP proposed by authors, she used the scheme of OTP. As there are many drawbacks of using alphanumerical passwords, people tend to forget the password, or they may write the password somewhere. Hence they have developed authentication methods that use pictures as passwords known as a graphical passwords to solve this problem. They have provided an additional layer of security by generating a one- time password(OTP) which is sent to the user's mobile. Using the instant messaging service available on the internet, the user will obtain the One Time Password (OTP). The OTP will be the information on the items present in the image to be clicked by the user. The users will authenticate themselves by clicking on various items in the image based on the information sent to them. The main aim of this system is to avoid Shoulder surfing attacks. It also aims to avoid other attacks like a dictionary attacks, brute force attack and guessing attack. The OTP is sent to the user’s mobile number from the database. The positive point of this system is it provides better security as it avoids shoulder surfing by using OTP. The negative point of this system is users must click within the tolerance of their chosen pixels and also in the correct sequence. better security. The Demerit of the system is sometimes © 2023, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1238 password is generated. The advantages of this system are that it reduces the login time, and session passwords are also generated to improve security. The disadvantage of this system is that the possibility of accidental login is high and the password is too short. [6] The authors proposed four systems that mainly focuses on graphical password. The textual-based password system is a popular authentication system since ancient times. It has many advantages but at the same time, it has a few drawbacks too. Hence, the current graphical password techniques is classified into four techniques recognition- based, pure recall-based, cued-recall based and hybrid based. [A]In the recognition-based algorithm the user must memorize the portfolio of images during password creation. When the user logs in, the user must recognize the images from the decoys. Various images like faces, icons, everyday objects, random art, etc. can be used. In the pure recall-based system the user recalls the outline drawing on the grid which they have created or selected during the registration phase. In this system, the user usually draws their password either on the grid or on a blank canvas. The cued recall-based system is similar to the recall system but it is recalled with cueing. In this system, reminders are sent to the user to reproduce the password accurately. The Hybrid system is a combination of two or more password schemes. It is used to overcome the limitation of a single system, such as the hotspot problems. The advantage of this system is it provides a high authentication process as it is categorized in four techniques. The disadvantage of this system is it’s a complex and long-term process. [2] In this paper, M. Sreelatha proposed Hybrid Textual Authentication Scheme. This scheme uses colors and the user has to rate the colors in the registration phase. During the login phase, four pairs of colors and an 8*8 matrix will be displayed. As the color rating is given by the user, the password will generate. The first color shows the row number and the second shows the column number of the grid. The drawback of this system is intersecting element is the first letter of the password. The user has to memorize the rating and order of the colors. So it becomes very hectic for the user. The benefit of this system is that it is flexible and simple to use. the color code-based scheme, the user has to get his password with the help of colors. During the registration phase, the user should fill up all his information and also rate colors. The merit of this system is it provides much [3] A hybrid graphical password-based method is advised, which is a mixture of recognition and recall-based methods and has many advantages as compared to existing systems and is more suitable for the user. In this system, the user draws the selected object which is then stored in the database with the specified username. Objects may be symbols, characters, auto shapes, simple daily-seen objects, etc. Then the user draws pre-selected objects as his password on a touch-sensitive screen with a mouse. Then the system performs preprocessing. Then after stroke merging, the system constructs the hierarchy then the next step is sketch simplification, then the three types of features are extracted from the sketch drawn by the user. The last step is called hierarchical matching. The plus point of this system is it’s a combination of recognition and recall-based techniques, hence providing flexibility. This system performs some complex actions like pre-processing and stroke merging. So it can be a weakness of this system. [4] The authors proposed a system in which a password scheme uses colors and text for generating session passwords. They have introduced a session password scheme in which the passwords are used only once for each session and when the session is completed the password is no longer in use. In this system, two session password schemes pair-based textual authentication scheme and a color code-based authentication scheme are introduced In the pair-based textual authentication scheme the user submits his password during the registration. The password should contain a number of characters. When the user enters login an interface containing a grid is shown during the login phase. The grid is of size 6 x 6 and it contains alphabets and numbers. These are randomly placed on the grid and the interface changes every time. Depending upon the password which is submitted during the registration phase, the user has to enter the password. Users have to consider their password in terms of pairs. In
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 p-ISSN: 2395-0072 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net in this proposed scheme, we propose an improved text- based shoulder surfing-resistant graphical password scheme by using colors. In the proposed scheme, the user can easily and efficiently log in system. Afterward, we examine the security and usability of the proposed system and show the resistance of the proposed system to shoulder surfing and accidental login. The benefit of this system is that it reduces the login time & it is an efficient system. 3. DFD Diagram © 2023, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1239 Research Methodology 3.1 Proposed System For reduce most common ways of hacking possibilities related with the text password i.e. Brute force and dictionary attack and Fishing. For more human friendly password. To increasing level of security. Create system which is easy to remember compared with text password. Providing more security. For password which would not be easy to guess. In this project here proposed we are going to use image position with some points. While login images appears in sequence in one by one manner. Click-based graphical password scheme, a cued-recall graphical password technique. Various graphical password schemes have been proposed as alternatives to text-based passwords. It can be used as password for folder lock, web-driven applications, desktop lock etc. In case if user fails to click right point for at least 3 times he will be blocked from login and a login link will be sent on users registered email. [7] The authors proposed a scheme that mainly focuses on shoulder surfing. In this system, they proposed a new click-based color password scheme called Color Click Points (CCP). It can be viewed as a combination of Pass- Points, Pass faces, and Stories. A password consists of one click-point per Color for a sequence of Colors. The next Color displayed is built on the previous click-point. 4. CONCLUSION Digital devices are becoming part of our life day by day. By using digital devices, we have able to know about the authentication process. Validation is an integral part of security. Authentication will give the customer greater security. Specific review articles research in the same field about the specific assaults found during validation. Printed hidden-term authentication is an excellent testing device. It is more useful and secure compared to previous old base graphical password authentication systems. Since the password space is very large, it offers security against brute-force attacks. It’s easy to use. Passwords can be easily created and recalled. The randomization in both
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 p-ISSN: 2395-0072 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net 5.REFERENCES [1] Dec 2020, H. Gao proposed a paper on a “graphical password scheme using color login”. [2] In May 2021, M. Sreelatha proposed Hybrid Textual Authentication Scheme. [3] Er. Aman Kumar, Er. Naveen Bilandi, Department of Computer Science and Engineering, DAV University, Jalandhar, Punjab, India “Graphical Password-Based Authentication Based System for Mobile Systems”. [4] Miss.Swati Tidke, Miss Nagama Khan, Miss.Swati Balpande Computer Engineering, RTM nagpur university, M.I.E.T Bhandara, “Password Authentication Using Text and Colors”. [5] Veena Rathanavel, Swati Mali, Student M. Tech, Department of Computer Engineering, K J Somaiya, College of Engineering Mumbai, “Graphical Password as an OTP”. [6] Veena Rathanavel, Swati Mali, Student M. Tech, Department of Computer Engineering, K J Somaiya, College of Engineering Mumbai, “Graphical Password as an OTP”. [7] In 2021 Aayush Dilipkumar Jain, Ramkrishna Khetan Krishnakant Dubey, Prof. Harshali Rambade K. Elissa, Department of Information Technology Vidyalankar Institute of Technology, Mumbai, “Color Shuffling Password- Based Authentication”. © 2023, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1240 authentication systems provides strong security against shoulder surfing. To have a good system, you need high security and good usability, and can’t be separated them. Shoulder navigation attack is subject to safety precautions. However, the proposed methods for the shoulder surfing problem still need to be improved. This system can also be used to add a higher level of security to the text-based password system. This system is very cheap compared to a biometrics system.
Descargar ahora