To see the other types of publications on this topic, follow the link: Graphical-based password.

Journal articles on the topic 'Graphical-based password'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Graphical-based password.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Nguyen, Thanh An, and Yong Zeng. "A VISION BASED GRAPHICAL PASSWORD." Journal of Integrated Design and Process Science: Transactions of the SDPS, Official Journal of the Society for Design and Process Science 14, no. 2 (2010): 43–52. http://dx.doi.org/10.3233/jid-2010-14204.

Full text
Abstract:
Graphical password is an authentication means alternative to textual password and biometric password. Graphical passwords are classified into two groups: picture based password and user-drawn based password. To pass the authentication, in the picture based graphical password, users have to choose right photos whereas in the user-drawn based graphical password, users have to draw correct pictures. In this paper, we propose a new user-drawn based graphical password. The proposed scheme requires users to create their secret by selecting individual points or by connecting points into curves from a
APA, Harvard, Vancouver, ISO, and other styles
2

Sagar, U.P. Prashasthi, U.P. Pravardha Sagar, and Preeti Dubey. "Image-based Object-sequenced Graphical Password Authentication System." International Journal of Microsystems and IoT 2, no. 4 (2024): 730–44. https://doi.org/10.5281/zenodo.11651505.

Full text
Abstract:
Textual passwords (one of the knowledge-based passwords) have been predictable and have long sustained security breaches due to their predictability (password dictionary attacks) and the possibility of shoulder-surfing and other such attacks. Biometric passwords are too rigid and can’t be duplicated but are expensive and cannot be applied to smaller, cost-effective systems. Whereas, Graphical Passwords are reliable, memorable and are known to improve one’s cognition, hence very convenient to the user.  Hybrid Authentication methods are proven to be far more secure than any oth
APA, Harvard, Vancouver, ISO, and other styles
3

Prashasthi, Sagar U. P., Sagar U. P. Pravardha, and P. Dubey. "Image-based Object-sequenced Graphical Password Authentication System." International Journal of Microsystems and IoT 2, no. 7 (2024): 1033–43. https://doi.org/10.5281/zenodo.13331483.

Full text
Abstract:
   Textual passwords (one of the knowledge-based passwords) have been predictable and have long sustained security breaches due to their predictability (password dictionary attacks) and the possibility of shoulder-surfing and other such attacks. Biometric passwords are too rigid and can’t be duplicated but are expensive and cannot be applied to smaller, cost-effective systems. Whereas Graphical Passwords are reliable, memorable and are known to improve one’s cognition, hence very convenient to the user.  Hybrid Authentication methods are proven to be far more secure
APA, Harvard, Vancouver, ISO, and other styles
4

Dias, Norman Ignatius, Mouleeswaran Singanallur Kumaresan, and Reeja Sundaran Rajakumari. "Deep learning based graphical password authentication approach against shoulder-surfing attacks." Multiagent and Grid Systems 19, no. 1 (2023): 99–115. http://dx.doi.org/10.3233/mgs-230024.

Full text
Abstract:
The password used to authenticate users is vulnerable to shoulder-surfing assaults, in which attackers directly observe users and steal their passwords without using any other technical upkeep. The graphical password system is regarded as a likely backup plan to the alphanumeric password system. Additionally, for system privacy and security, a number of programs make considerable use of the graphical password-based authentication method. The user chooses the image for the authentication procedure when using a graphical password. Furthermore, graphical password approaches are more secure than t
APA, Harvard, Vancouver, ISO, and other styles
5

Shaik Mehboob Basha and K.Kumara Swamy. "Web Based Graphical Password Authentication System." international journal of engineering technology and management sciences 9, no. 2 (2025): 779–85. https://doi.org/10.46647/ijetms.2025.v09i02.099.

Full text
Abstract:
Graphical passwords provide a promising alternative to traditional alphanumeric passwords. Theyare attractive since people usually remember pictures better than words. In this extended abstract,we propose a simple graphical password authentication system. We describe its operation withsome examples, and highlight important aspects of the system.
APA, Harvard, Vancouver, ISO, and other styles
6

Jirjees, Seerwan Waleed, Ali Majeed Mahmood, and Ahmed Raoof Nasser. "Passnumbers: An Approach of Graphical Password Authentication Based on Grid Selection." International Journal of Safety and Security Engineering 12, no. 1 (2022): 21–29. http://dx.doi.org/10.18280/ijsse.120103.

Full text
Abstract:
The authentication textual passwords are the most widely used technique. However, this type of legacy authentication is vulnerable to various attacks, such as shoulder-surfing attacks. Hence, graphical password authentication is one of these approaches which has been suggested to overcome the issues related to textual passwords. Nevertheless, the hackers have also developed new techniques that can be finally broken the graphical password, for instance, listening to the transmitted information between the client and the server. In this paper, Passnumbers graphical authentication password is pro
APA, Harvard, Vancouver, ISO, and other styles
7

Khodadadi, Touraj, A. K. M. Muzahidul Islam, Sabariah Baharun, and Shozo Komaki. "Evaluation of Recognition-Based Graphical Password Schemes in Terms of Usability and Security Attributes." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (2016): 2939. http://dx.doi.org/10.11591/ijece.v6i6.11227.

Full text
Abstract:
<p>User Authentication is a critical component in information security. Several widely used mechanisms for security to protect services from illegal access include alphanumerical usernames passwords. However, there are several drawbacks attached in this method. For instance, the users themselves usually those passwords that are easy to guess. As difficult passwords are difficult to recall. A new alternative is the graphic-based password and there has been a growing trend in the use of such a password. The human psychology study reveals that humans find it easier to remember pictures as o
APA, Harvard, Vancouver, ISO, and other styles
8

Khodadadi, Touraj, A. K. M. Muzahidul Islam, Sabariah Baharun, and Shozo Komaki. "Evaluation of Recognition-Based Graphical Password Schemes in Terms of Usability and Security Attributes." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (2016): 2939. http://dx.doi.org/10.11591/ijece.v6i6.pp2939-2948.

Full text
Abstract:
<p>User Authentication is a critical component in information security. Several widely used mechanisms for security to protect services from illegal access include alphanumerical usernames passwords. However, there are several drawbacks attached in this method. For instance, the users themselves usually those passwords that are easy to guess. As difficult passwords are difficult to recall. A new alternative is the graphic-based password and there has been a growing trend in the use of such a password. The human psychology study reveals that humans find it easier to remember pictures as o
APA, Harvard, Vancouver, ISO, and other styles
9

Prof., Sarita T. Sawale, Kalyani J. Anpat Ms., and Priyanka Savaji Ms. "SURVEY OF GRAPHICAL PASSWORD." International Journal of Advances in Engineering & Scientific Research 2, no. 3 (2015): 01–09. https://doi.org/10.5281/zenodo.10725847.

Full text
Abstract:
<strong><em>Abstract</em><em>: </em></strong> <em>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Over the years security experts in the field of information technology have had a tough time to making passwords secure. Graphical passwords have been designed to try to make passwords more remarkable and more comfortable for people to use and, therefore, more secure. Passwords provide security mechanism for authentication and protection services against unwanted access to resources. A graphical based password is one promising alte
APA, Harvard, Vancouver, ISO, and other styles
10

Sekhar Reddy, Y. Chandra, M. Venkateswara Rao, M. Kameswara Rao, C. V. Phaneendra Kumar, and A. Anil Sai. "Graphical Password Using Captcha." International Journal of Advances in Applied Sciences 5, no. 2 (2016): 94. http://dx.doi.org/10.11591/ijaas.v5.i2.pp94-100.

Full text
Abstract:
In this 21st century one of the main issue to tackle was Cyber Security attack. We have numerous authentication processes like two key factor passwords, graphical passwords and many other. Text based passwords are prone to many attacks like dictionary attacks. In this paper, we have implemented a new authentication method namely; a family of graphical passwords built on Captcha technology. As graphical password addresses many security problems like online guessing attacks, relay attacks etc. Captcha is used to distinguish humans and bots. So, we use images with captcha’s as one of the authenti
APA, Harvard, Vancouver, ISO, and other styles
11

Zhou, Zhili, Ching-Nung Yang, Yimin Yang, and Xingming Sun. "Polynomial-Based Google Map Graphical Password System against Shoulder-Surfing Attacks in Cloud Environment." Complexity 2019 (November 16, 2019): 1–8. http://dx.doi.org/10.1155/2019/2875676.

Full text
Abstract:
Text password systems are commonly used for identity authentication to access different kinds of data resources or services in cloud environment. However, in the text password systems, the main issue is that it is very hard for users to remember long random alphanumeric strings due to the long-term memory limitation of the human brain. To address this issue, graphical passwords are accordingly proposed based on the fact that humans have better memory for images than alphanumeric strings. Recently, a Google map graphical password (GMGP) system is proposed, in which a specific location of Google
APA, Harvard, Vancouver, ISO, and other styles
12

Hamid, Soomaiya, Narmeen Zakaria Bawany, and Shahzeb Khan. "AcSIS: Authentication System Based on Image Splicing." Engineering, Technology & Applied Science Research 9, no. 5 (2019): 4808–12. https://doi.org/10.5281/zenodo.3510300.

Full text
Abstract:
Text-based passwords are widely used for the authentication of digital assets. Typically, password security and usability is a trade-off, i.e. easy-to-remember passwords have higher usability that makes them vulnerable to brute-force and dictionary attacks. Complex passwords have stronger security but poor usability. In order to strengthen the security in conjunction with the improved usability, we hereby propose a novel graphical authentication system. This system is a picturebased password scheme which comprises of the method of image splicing. Authentication data were collected from 33 diff
APA, Harvard, Vancouver, ISO, and other styles
13

Anitha, M., and G. Saranya. "User Privileged CAPTCHA as Graphical Password for Multistage Authentication." International Journal of Advance Research and Innovation 3, no. 1 (2015): 28–33. http://dx.doi.org/10.51976/ijari.311505.

Full text
Abstract:
Nowadays, user authentication is one of the important topics in information security. In today’s world the password security is very important. For password protection various techniques are available. Cued Click Points are a click-based graphical password scheme, a cued-recall graphical password technique. Users Click on one point per image for a sequence of images. The next image is based on the previous click-point. The passwords which are easy to memorize are chosen by the users and it becomes easy for attackers to guess it, but the passwords assigned by the strong system are difficult for
APA, Harvard, Vancouver, ISO, and other styles
14

Gopalakrishnan, Adithya, Anugraha K Anil, Anu Thomas, Devika Vijayan ,, and Mafnitha K K. "Graphical Password Authentication: Strengthening Security in the Digital Age." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem43155.

Full text
Abstract:
Authentication is vital for maintaining system secu- rity. Graphical password-based authentication systems provide a promising alternative to traditional authentication methods such as alphanumeric or text-based passwords. Conventional authentication systems are susceptible to brute force attacks, dictionary attacks, password guessing and user memory fatigue. Users create a personalized password by selecting a sequence of images or points in an image grid, which enhances security due to the complexity of graphical choices over traditional textual passwords. Graphical Password Based Authenticat
APA, Harvard, Vancouver, ISO, and other styles
15

Golar, Priti C., and Rika Sharma. "An Advanced Knowledge Based Graphical Authentication Framework with Guaranteed Confidentiality and Integrity." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (2023): 720–30. http://dx.doi.org/10.17762/ijritcc.v11i8s.7676.

Full text
Abstract:
The information and security systems largely rely on passwords,which remain the fundamental part of any authentication process. The conventional authentication method based on alphanumerical username and password suffer from significant disadvantages. The graphical password-based authentication system has recently been introduced as an effective alternative. Although the graphical schemes effectively generate the passwords with better flexibility and enhanced security, the most common problem with this is the shoulder surfing attack. This paper proposes an effective 3D graphical password authe
APA, Harvard, Vancouver, ISO, and other styles
16

Roy, Indrani, Ajmerry Hossain, and SARKER TANVEER AHMED RUMEE. "Attacks on Graphical Password: A Study on Defense Mechanisms and Limitations." International Journal of Information Technology and Applied Sciences (IJITAS) 3, no. 4 (2021): 180–83. http://dx.doi.org/10.52502/ijitas.v3i4.201.

Full text
Abstract:
User authentication is mostly reliant on password-based based verification. Users generally used text-based passwords, which are user-friendly but often predictable and vulnerable to some common attacks. To overcome these shortcomings, graphical authentication methods have emerged. Here, users choose a sequence of images as passwords. Though such methods help users to better remember their passwords, they too suffer from attacks seen in the case of textual passwords. This paper presents a comprehensive summary of the vulnerabilities state of the art graphical password schemes against the follo
APA, Harvard, Vancouver, ISO, and other styles
17

F. Abbas, Safa, and Lahieb M. Jawad. "PASS POINT SELECTION OF AUTOMATIC GRAPHICAL PASSWORD AUTHENTICATION TECHNIQUE BASED ON HISTOGRAM METHOD." Iraqi Journal of Information and Communication Technology 6, no. 1 (2023): 28–39. http://dx.doi.org/10.31987/ijict.6.1.212.

Full text
Abstract:
Graphical passwords, as opposed to textual passwords, require the user to pick pictures or draw symbols rather than input written letters. They are an option that may be explored in order to get over the issues that are caused by the system of passwords that are based on text. It has been hypothesized that graphical passwords are more difficult to crack using a brute force technique or to figure out through guessing. This paper proposes an authentication system based on a graphical password method. The proposed system computes the password points using histogram arithmetic and encrypts the cho
APA, Harvard, Vancouver, ISO, and other styles
18

Werner, Steffen, Christopher Hauck, and Marshall Masingale. "Password Entry Times for Recognition-based Graphical Passwords." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (2016): 755–59. http://dx.doi.org/10.1177/1541931213601173.

Full text
Abstract:
Graphical passwords offer a more memorable alternative to traditional, text-based passwords. Among current contenders, cued-recall based click-point or gesture centered authentication systems like Microsoft’s picture gesture authentication (PGA) have been commercially more successful than recognition based systems (e.g., PassFaces). One perceived drawback of graphical authentication systems in general and especially recognition based authentication is the assumption that graphical authentication is slower and thus less user-friendly than traditional password entry via keyboard. This paper addr
APA, Harvard, Vancouver, ISO, and other styles
19

Yang, Gi-Chul, and . "A New Graphical Password System Using Intersecting Points in a Signature." International Journal of Engineering & Technology 7, no. 4.39 (2018): 61–64. http://dx.doi.org/10.14419/ijet.v7i4.39.23707.

Full text
Abstract:
Background/Objectives: These days the most commonly used method of digital user authentication uses text-based passwords. Security enhancements using text-based passwordsrequire long and complex passwords, but long and complex text-based passwords are hard to remember and inconvenient to use. Therefore, authentication techniques that can replace text-based passwords are necessary. The objective of this paper is developing a user friendly graphical password system with strong security power.Methods/Statistical analysis: In order to develop a user friendly graphical password system with strong
APA, Harvard, Vancouver, ISO, and other styles
20

Abhishek, Narayan Shah, Anand Dipti, Samanta Sabyasachi, and Dey Dipankar. "Graphical Password Authentication System Using Modified Intuitive Approach." International Journal of HIT Transaction on ECCN Vol. 7, no. 2A (2021) (2021): 64–71. https://doi.org/10.5281/zenodo.5893206.

Full text
Abstract:
B. Tech Student, Haldia Institute of Technology, Dept. of IT, Haldia, WB, India Haldia Institute of Technology, Dept. of IT, Haldia, WB, India Global Institute of Science and Technology, Haldia, WB, India In today&rsquo;s world everything we use needs security, especially when we are using something on internet. For security purpose, we use text passwords as it is the most popular user authentication method, but have security and user friendly problems. To address this problem, some researchers have developed authentication methods that use pictures as passwords. Graphical passwords offer anot
APA, Harvard, Vancouver, ISO, and other styles
21

Saha, Hasi, Ganesh Chandra Saha, Roshidul H, and Zakirul Islsam. "USER AUTHENTICATION THROUGH CUED CLICK POINTS BASED GRAPHICAL PASSWORD." American Journal of Agricultural Science, Engineering, and Technology 3, no. 1 (2017): 1–12. http://dx.doi.org/10.54536/ajaset.v3i1.38.

Full text
Abstract:
User authentication is a fundamental component in most computer security context. In recent years, computer and network security has been formulated as a technical problem. A key area in security research is authentication which is the determination of whether a user should be allowed access to a given system or resource. In this respect, Authentication is a process by which a system verifies the identity of a user. Authentication may also be generalized by saying that “to authenticate” means “to authorize”. Users tend to pick passwords that can be easily guessed, on the other hand, if
APA, Harvard, Vancouver, ISO, and other styles
22

Maw, Maw Naing, and Win Ohnmar. "Graphical Password Authentication using image Segmentation for Web Based Applications." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 1461–64. https://doi.org/10.5281/zenodo.3591236.

Full text
Abstract:
One of the most important topics in information security today is user authentication. User authentication is a fundamental component in most computer security contexts. It provides the basis for access control and user accountability. While there are various types of user authentication systems, alphanumeric passwords are the most common type of user authentication. They are versatile and easy to implement and use. However, it can either be long and secure or short and hard to remember. A graphical based password is one promising alternatives of textual passwords. According to human psycholog
APA, Harvard, Vancouver, ISO, and other styles
23

Lin, Tsung-Hung, Cheng-Chi Lee, Chwei-Shyong Tsai, and Shin-Dong Guo. "A tabular steganography scheme for graphical password authentication." Computer Science and Information Systems 7, no. 4 (2010): 823–41. http://dx.doi.org/10.2298/csis081223028l.

Full text
Abstract:
Authentication, authorization and auditing are the most important issues of security on data communication. In particular, authentication is the life of every individual essential closest friend. The user authentication security is dependent on the strength of user password. A secure password is usually random, strange, very long and difficult to remember. For most users, remember these irregular passwords are very difficult. To easily remember and security are two sides of one coin. In this paper, we propose a new graphical password authentication protocol to solve this problem. Graphical pas
APA, Harvard, Vancouver, ISO, and other styles
24

Herrera-Macías, Joaquín Alberto, Carlos Miguel Legón-Pérez, Lisset Suárez-Plasencia, Luis Ramiro Piñeiro-Díaz, Omar Rojas, and Guillermo Sosa-Gómez. "Test for Detection of Weak Graphic Passwords in Passpoint Based on the Mean Distance between Points." Symmetry 13, no. 5 (2021): 777. http://dx.doi.org/10.3390/sym13050777.

Full text
Abstract:
This work demonstrates the ineffectiveness of the Ripley’s K function tests, the distance to the nearest neighbor, and the empty space function in the Graphical Authentication scenario with Passpoint for the detection of non-random graphical passwords. The results obtained show that none of these tests effectively detect non-random graphical passwords; the reason for their failure is attributed to the small sample of the spatial pattern in question, where only the five points of the graphical password are analyzed. Consequently, a test based on mean distances is proposed, whose experiments sho
APA, Harvard, Vancouver, ISO, and other styles
25

Nandi, Pathik, and Dr Preeti Savant. "Graphical Password Authentication System." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1759–65. http://dx.doi.org/10.22214/ijraset.2022.41621.

Full text
Abstract:
Abstract: Graphical password is one of technic for authentication of computer security. Now days digital/computer security is most important things in computer science for protected user or customer data. And Shoulder-surfing is a one of the threats where a criminal can steal a password by direct observation or by recording the authentication session. There are several techniques available for this authentication, the most prevalent and simple of which is the Graphical password technique. So, we suggest a new technique to combat this problem. We have developed two concepts to combat shoulder s
APA, Harvard, Vancouver, ISO, and other styles
26

L.P.Ramyasri, P., D. Malathi, J. D. Dorathi Jayaseeli, and K. Senthilkumar. "Study and Development of Graphical Authentication System for Secure File Transmission." International Journal of Engineering & Technology 7, no. 4.10 (2018): 470. http://dx.doi.org/10.14419/ijet.v7i4.10.21042.

Full text
Abstract:
The text-based password has been the most common practice from ancient days till present. Text based pass-words are also known for various threats, and it is prone to attacks like guessing attacks, dictionary attacks, social engineering attacks, brute force attacks, etc. The next immediate concept following the text based password is the graphical password schemes to improve password security and usability. In present days graphical passwords are being implemented more commonly. This approach is different from the traditional alpha numeric as it deals with images. In this paper a survey study
APA, Harvard, Vancouver, ISO, and other styles
27

Hamid, S., N. Z. Bawany, and S. Khan. "AcSIS: Authentication System Based on Image Splicing." Engineering, Technology & Applied Science Research 9, no. 5 (2019): 4808–12. http://dx.doi.org/10.48084/etasr.3060.

Full text
Abstract:
Text-based passwords are widely used for the authentication of digital assets. Typically, password security and usability is a trade-off, i.e. easy-to-remember passwords have higher usability that makes them vulnerable to brute-force and dictionary attacks. Complex passwords have stronger security but poor usability. In order to strengthen the security in conjunction with the improved usability, we hereby propose a novel graphical authentication system. This system is a picture-based password scheme which comprises of the method of image splicing. Authentication data were collected from 33 dif
APA, Harvard, Vancouver, ISO, and other styles
28

Loganathan, D. "Graphical Password Authentication: Image Grid Based Digital Lock for Mobile Apps." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 4735–47. http://dx.doi.org/10.22214/ijraset.2023.52681.

Full text
Abstract:
Abstract: Over the past few decades, research on authentication methods has advanced significantly. While the initial focus was on using standardised password selection and management approaches to secure textual passwords, this was made possible by learning about the flaws in the existing systems based on the attacks performed on the same systems' vulnerabilities. With the rise of biometric-based authentication, the next stage in the study and development of improved solutions has begun. Although initially rather entertaining, this authentication method is very insecure. Once a person's biome
APA, Harvard, Vancouver, ISO, and other styles
29

Awan, Kamran Ahmad, Ikram Ud Din, Abeer Almogren, Neeraj Kumar, and Ahmad Almogren. "A Taxonomy of Multimedia-based Graphical User Authentication for Green Internet of Things." ACM Transactions on Internet Technology 22, no. 2 (2022): 1–28. http://dx.doi.org/10.1145/3433544.

Full text
Abstract:
Authentication receives enormous consideration from the research community and is proven to be an interesting field in today’s era. User authentication is the major concern because people have their private data on devices. To strengthen user authentication, passwords have been introduced. In the past, the text-based password was the traditional way of authentication, but this method has particular shortcomings. The graphical password has been introduced as an alternative, which uses a picture or a set of pictures to generate a password. In the future, it is a requirement of such approaches to
APA, Harvard, Vancouver, ISO, and other styles
30

Rangari, Mr Shantanu, and Prof K. R. Ingole. "Review Paper Graphical Password Authentication Technique for Security." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (2022): 1980–82. http://dx.doi.org/10.22214/ijraset.2022.40969.

Full text
Abstract:
Abstract: In modern age user authentication is a mandatory attribute in the area of data security. The characteristics of finding an individual generally based on a user id and password which is commonly used methodology for identifying users in system. Text based password is a general authentication method used from early times. There are numerous authentication systems like biometric, textual, graphical, smart card etc. Graphical password is an alternative to alphanumeric password which is tough to remember and generally forget by users as times passes. But in graphical password there is les
APA, Harvard, Vancouver, ISO, and other styles
31

Edward, Audu Lovingkindness, Hassan Suru, and Mustapha Abubakar Giro­. "A Comparison Between Position-Based and Image-Based Multi-Layer Graphical user Authentication System." Oriental journal of computer science and technology 16, no. 01 (2023): 46–60. http://dx.doi.org/10.13005/ojcst16.01.03.

Full text
Abstract:
System security is very important, especially in the age that we live in. One of the ways to secure data is by creating a password that makes it difficult for unauthorized user to gain access to the system. However, what makes it difficult for the system to be attacked is directly dependent on approach used to create it, and how secured it is. Text based approach is the oldest authentication approach. It requires that the user supplies textual password in order to gain access to the system. However, this approach has shown a significant drawback and several vulnerabilities, one of which is the
APA, Harvard, Vancouver, ISO, and other styles
32

Santoso, Joseph Teguh, Budi Raharjo, and Agus Wibowo. "Combination of Alphanumeric Password and Graphic Authentication for Cyber Security." Journal of Internet Services and Information Security 14, no. 1 (2023): 16–36. http://dx.doi.org/10.58346/jisis.2024.i1.002.

Full text
Abstract:
The main objective of this research is to create a more secure and user-friendly password-generation method that is less vulnerable to attacks such as shoulder surfing. Similarly, while textual or alphanumeric passwords are not entirely secure, they also come with certain limitations, including issues related to memory. The novelty of this research is the development of a new algorithm (Secure Password Algorithm/SPA) for password generation that uses graphics to generate textual input from users based on user perceptions. This method is more resilient against attacks like shoulder surfing and
APA, Harvard, Vancouver, ISO, and other styles
33

Saadi, Zena Mohammad, Ahmed T. Sadiq, Omar Z. Akif, and Alaa K. Farhan. "A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords." Electronics 13, no. 15 (2024): 3042. http://dx.doi.org/10.3390/electronics13153042.

Full text
Abstract:
As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward p
APA, Harvard, Vancouver, ISO, and other styles
34

Gyorffy, John Charles, Andrew F. Tappenden, and James Miller. "Token-based graphical password authentication." International Journal of Information Security 10, no. 6 (2011): 321–36. http://dx.doi.org/10.1007/s10207-011-0147-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Geetha, Mrs Ch Naga Lakshmi, A. Sowmya Sri Satya Devi, J. Harshita Maha Lakshmi, Suvvari Aravind, and A. Sri Ramanna Dora. "A Recognition-Based Graphical Password System for Enhanced User Authentication." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 5357–61. http://dx.doi.org/10.22214/ijraset.2024.61183.

Full text
Abstract:
Abstract: Password-based authentication is a popular way for ensuring computer application security and privacy. Nonetheless, the "weakest link" in the authentication process is believed to be user-chosen weak passwords and hazardous input techniques. People generally utilize mnemonic or brief passphrases instead of random alphanumeric characters. Because internet and mobile applications are widely available, users can access them from any location, at any time, using any device. While this simplicity is generally appreciated, it also increases the likelihood that credentials will be compromis
APA, Harvard, Vancouver, ISO, and other styles
36

Katsini, Christina, Nikolaos Avouris, and Christos Fidas. "CogniPGA: Longitudinal Evaluation of Picture Gesture Authentication with Cognition-Based Intervention." i-com 18, no. 3 (2019): 237–57. http://dx.doi.org/10.1515/icom-2019-0011.

Full text
Abstract:
AbstractThere is evidence that the visual behavior of users when creating graphical passwords affects the password strength. Adopting a cognitive style perspective in the interpretation of the results of recent studies revealed that users, depending on their cognitive style, follow different visual exploration paths when creating graphical passwords which affected the password strength. To take advantage of the inherent abilities of people, we proposed CogniPGA, a cued-recall graphical authentication scheme where a cognition-based intervention using gaze data is applied. This paper presents th
APA, Harvard, Vancouver, ISO, and other styles
37

Gangadhara Rao, K., Vijayakumari Rodda, and B. Basaveswara Rao. "Qualitative Analysis of Recognition-based Graphical Password Authentication Schemes for Accessing the Cloud." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 2 (2017): 507. http://dx.doi.org/10.11591/ijeecs.v7.i2.pp507-513.

Full text
Abstract:
&lt;p&gt;Cloud computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platforms. However, a major barrier for cloud application is real and perceived lack of security. There are many security mechanisms exercised to utilize cloud services. Amongst them the prominent and primitive security mechanism is the Authentication System. Traditional text based passwords are susceptible to threats. Tough passwords are hard to recall and easily recalled passwords are simple and predictable. Graphical passwords are introduced as the better alternative. Two
APA, Harvard, Vancouver, ISO, and other styles
38

Kumar, Aayush, Keshav Kumar, Siddharth Shekhar Singh, and M. Vaneeta. "An Efficient Graphical Authentication System." Asian Journal of Science and Applied Technology 6, no. 1 (2017): 42–45. http://dx.doi.org/10.51983/ajsat-2017.6.1.937.

Full text
Abstract:
Password authentication is majorly used in applications for computer security and privacy. However, human actions such as selecting bad passwords and inputting passwords in an insecure way are considered as” the weakest link” in the authentication process. Rather than arbitrary alphanumeric string, users generally use weak password, more often based on their personal information. With new technologies coming up and mobile apps piling up, users can use the application anytime and anywhere with various devices. Although the evolution is convenient but it also increases the probability of exposin
APA, Harvard, Vancouver, ISO, and other styles
39

Rangari, Mr Shantanu, and Prof K. R. Ingole. "Implementation of Graphical Password Authentication Technique for Security Using Cued Click Points Algorithm." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1476–79. http://dx.doi.org/10.22214/ijraset.2022.41416.

Full text
Abstract:
Abstract: In today's world, most Internet applications still establish user authentication with a traditional text-based password. Designing a secure as well as user-friendly password-based method has long been on the agenda of security researchers. On the one hand, there are password manager programs that make it easy to create site-specific strong passwords from a single user's password to eliminate the memory burden caused by multiple passwords. We offer different levels of authentication such as Textual Authentication, Image Authentication and Audio Authentication to provide better securit
APA, Harvard, Vancouver, ISO, and other styles
40

Kumar, Esha. "Securing Graphical Password Techniques from Shoulder Surfing and Camera Based Attacks." International Journal of Recent Technology and Engineering (IJRTE) 11, no. 3 (2022): 1–5. http://dx.doi.org/10.35940/ijrte.b7164.0911322.

Full text
Abstract:
Authentication is a procedure that checks for validity and may be carried out in a variety of methods, including tokens, biometrics, and passwords with text and graphics. Usability is the primary driver of graphical passwords. However, shoulder surfing and camera-based attacks are the main potential disadvantage of this strategy. Shoulder surfing is a sort of social engineering method used in computer security to peek over the victim’s shoulder and steal information, including personal identification numbers (PINs), passwords, and other private information. This attack can be carried out eithe
APA, Harvard, Vancouver, ISO, and other styles
41

R, Poonkodi, Jawahar Sriraam S R, Deepakvel M, Gokulnath J, and Jagathishprabu S. "An Enhanced Security Model for Simple Reformation-Based Password Scheme using PHP." International Journal of Computer Science and Mobile Computing 11, no. 5 (2022): 40–50. http://dx.doi.org/10.47760/ijcsmc.2022.v11i05.004.

Full text
Abstract:
Lack of security has become a major concern, given the prevalence of attackers, hackers, crackers, scammers and spammers. A key area in security research and practice is authentication, the determination of whether a user should be allowed to access a given system or resource. Existing authentication processes are usually accomplished by user ID and password, with the authentication schemes Pair-based Authentication scheme based. Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering an
APA, Harvard, Vancouver, ISO, and other styles
42

Suárez-Plasencia, Lisset, Joaquín Alberto Herrera-Macías, Carlos Miguel Legón-Pérez, Guillermo Sosa-Gómez, and Omar Rojas. "Detection of DIAG and LINE Patterns in PassPoints Graphical Passwords Based on the Maximum Angles of Their Delaunay Triangles." Sensors 22, no. 5 (2022): 1987. http://dx.doi.org/10.3390/s22051987.

Full text
Abstract:
An alternative authentication method to traditional alphanumeric passwords is graphical password authentication, also known as graphical authentication, for which one of the most valuable cued-recall techniques is PassPoints. This technique stands out for its security and usability. However, it can be violated if the user follows a predefined pattern when selecting the five points in an image as their passwords, such as the DIAG and LINE patterns. Dictionary attacks can be built using these two patterns to compromise graphical passwords. So far, no reports have been found in the state of the a
APA, Harvard, Vancouver, ISO, and other styles
43

Esha, Kumar. "Securing Graphical Password Techniques from Shoulder Surfing and Camera Based Attacks." International Journal of Recent Technology and Engineering (IJRTE) 11, no. 3 (2022): 1–5. https://doi.org/10.35940/ijrte.B7164.0911322.

Full text
Abstract:
<strong>Abstract:</strong> Authentication is a procedure that checks for validity and may be carried out in a variety of methods, including tokens, biometrics, and passwords with text and graphics. Usability is the primary driver of graphical passwords. However, shoulder surfing and camera-based attacks are the main potential disadvantage of this strategy. Shoulder surfing is a sort of social engineering method used in computer security to peek over the victim&rsquo;s shoulder and steal information, including personal identification numbers (PINs), passwords, and other private information. Thi
APA, Harvard, Vancouver, ISO, and other styles
44

Kalimuthu, P., and A. Justin Diraviam. "Simple Authentication Technique for Session Management Using Odd and Even Pair of Random Text and Color Password in Cloud Computing." Asian Journal of Computer Science and Technology 1, no. 1 (2012): 130–34. http://dx.doi.org/10.51983/ajcst-2012.1.1.1691.

Full text
Abstract:
Simple Authentication Technique for Session Management Using Odd and Even Pair of Random Text and Color Password in Cloud Computing&#x0D; While some legal challenges in cyberspace have started to become clearer, the use of cloud computing and hosted applications adds a new dimension of legal risk. Compliance, privacy, and security problems are compounded by the use of remote, distributed services operated by third parties. Businesses employing these new technologies must look a new at their online risk, and learn how to assess and manage it. Authentication is the first line of defense against
APA, Harvard, Vancouver, ISO, and other styles
45

Taware, Shruti. "A Survey on Graphical Password Strategy Authentication." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem35080.

Full text
Abstract:
In an ever-evolving digital realm, ensuring the security and reliability of software applications has become increasingly crucial. The continuous advancement of technology also brings about more complex cyber threats, emphasizing the urgent need to identify and address vulnerabilities. In response to this growing imperative, we introduce "Graphical Password Authenticator: A Novel Approach to Secure User Authentication." The Graphical Password Authenticator reimagines the conventional user authentication process by utilizing graphical elements and innovative techniques. It provides a secure and
APA, Harvard, Vancouver, ISO, and other styles
46

Abdalkareem, Zahraa A., Omar Z. Akif, Firas A. Abdulatif, A. Amiza, and Phaklen Ehkan. "Graphical password based mouse behavior technique." Journal of Physics: Conference Series 1755, no. 1 (2021): 012021. http://dx.doi.org/10.1088/1742-6596/1755/1/012021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Chopra, Aakanksha, Megha Gupta, and Vivek Kumar Sharma. "A Hybrid Graphical Password Technique for Mobile Data Security Based on Direction." ECS Transactions 107, no. 1 (2022): 19105–29. http://dx.doi.org/10.1149/10701.19105ecst.

Full text
Abstract:
Mobile Security has exponentially increased data sensitivitydue to the users upsurge in mobile devices. People are utilizing smartphones as the substitute for desktop or laptop systems, from which they access, download, upload, modify, create, and share their files. Every data has become crucial as and when exposed to other platforms via smartphone. Therefore, all smartphones require security from malicious users. Forthcoming mobile devices will have hybrid graphical passwords as prospects for customer authentication. Users can easily interact with their devices through mixed authentication te
APA, Harvard, Vancouver, ISO, and other styles
48

Kowsalya, Ms, Mr Yogalingam, Mr Sanjay Prasath, and Mr Surya Prakash. "Click and Session based Captcha as Graphical Password Authentication Process using AI Technology." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 1631–35. http://dx.doi.org/10.22214/ijraset.2023.49669.

Full text
Abstract:
Abstract: Graphical passwords, two-factor authentication, and other ways are just a few of the many options we have for authentication. Text based protection. Codes are susceptible to a variety of assaults, including dictionary attacks. As a result, as part of the authentication procedure, in addition to the usual alpha-numeric password, we also utilise pictures with captchas. It also fixes the problems with the pass points of graphical password systems. Automated Turing Test for Computers and Humans that Is Completely Public (CAPTCHA) Users who have successfully authenticated must pass a test
APA, Harvard, Vancouver, ISO, and other styles
49

Saadi, Zena M., Ahmed T. Sadiq, and Omar Z. Akif. "Graphical User Authentication Algorithms Based on Recognition." ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY 12, no. 2 (2024): 79–93. http://dx.doi.org/10.14500/aro.11603.

Full text
Abstract:
In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these
APA, Harvard, Vancouver, ISO, and other styles
50

Priyanka Shingate, Shruti Taware, Pratik Deshpande, Tanaya Deshmukh, and Anshu Thakur. "A Research on Graphical Password Strategy Authentication." International Journal of Scientific Research in Science, Engineering and Technology 11, no. 3 (2024): 237–48. http://dx.doi.org/10.32628/ijsrset24113120.

Full text
Abstract:
In an ever-evolving digital realm, ensuring the security and reliability of software applications has become increasingly crucial. The continuous advancement of technology also brings about more complex cyber threats, emphasizing the urgent need to identify and address vulnerabilities. In response to this growing imperative, we introduce "Graphical Password Authenticator: A Novel Approach to Secure User Authentication." The Graphical Password Authenticator reimagines the conventional user authentication process by utilizing graphical elements and innovative techniques. It provides a secure and
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!