Academic literature on the topic 'Graphical Password Authentication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Graphical Password Authentication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Graphical Password Authentication"

1

Bhardwaj, Utkarsh. "Graphical Password Authentication." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 4656–61. http://dx.doi.org/10.22214/ijraset.2023.51883.

Full text
Abstract:
Abstract: A graphical password authentication is a form of authentication where users select a picture, image, or sequence as their password. Graphical passwords are an alternative to alphanumeric passwords in which users click on graphical images rather than typing alphanumeric characters to authenticate their identity. This method has gained popularity due to its ease of use and ability to provide better security than traditional alphanumeric passwords. This research paper provides a comprehensive study of graphical password authentication, including its history, types, advantages and disadv
APA, Harvard, Vancouver, ISO, and other styles
2

Taware, Shruti. "A Survey on Graphical Password Strategy Authentication." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem35080.

Full text
Abstract:
In an ever-evolving digital realm, ensuring the security and reliability of software applications has become increasingly crucial. The continuous advancement of technology also brings about more complex cyber threats, emphasizing the urgent need to identify and address vulnerabilities. In response to this growing imperative, we introduce "Graphical Password Authenticator: A Novel Approach to Secure User Authentication." The Graphical Password Authenticator reimagines the conventional user authentication process by utilizing graphical elements and innovative techniques. It provides a secure and
APA, Harvard, Vancouver, ISO, and other styles
3

Sekhar Reddy, Y. Chandra, M. Venkateswara Rao, M. Kameswara Rao, C. V. Phaneendra Kumar, and A. Anil Sai. "Graphical Password Using Captcha." International Journal of Advances in Applied Sciences 5, no. 2 (2016): 94. http://dx.doi.org/10.11591/ijaas.v5.i2.pp94-100.

Full text
Abstract:
In this 21st century one of the main issue to tackle was Cyber Security attack. We have numerous authentication processes like two key factor passwords, graphical passwords and many other. Text based passwords are prone to many attacks like dictionary attacks. In this paper, we have implemented a new authentication method namely; a family of graphical passwords built on Captcha technology. As graphical password addresses many security problems like online guessing attacks, relay attacks etc. Captcha is used to distinguish humans and bots. So, we use images with captcha’s as one of the authenti
APA, Harvard, Vancouver, ISO, and other styles
4

Nandi, Pathik, and Dr Preeti Savant. "Graphical Password Authentication System." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1759–65. http://dx.doi.org/10.22214/ijraset.2022.41621.

Full text
Abstract:
Abstract: Graphical password is one of technic for authentication of computer security. Now days digital/computer security is most important things in computer science for protected user or customer data. And Shoulder-surfing is a one of the threats where a criminal can steal a password by direct observation or by recording the authentication session. There are several techniques available for this authentication, the most prevalent and simple of which is the Graphical password technique. So, we suggest a new technique to combat this problem. We have developed two concepts to combat shoulder s
APA, Harvard, Vancouver, ISO, and other styles
5

Gopalakrishnan, Adithya, Anugraha K Anil, Anu Thomas, Devika Vijayan ,, and Mafnitha K K. "Graphical Password Authentication: Strengthening Security in the Digital Age." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem43155.

Full text
Abstract:
Authentication is vital for maintaining system secu- rity. Graphical password-based authentication systems provide a promising alternative to traditional authentication methods such as alphanumeric or text-based passwords. Conventional authentication systems are susceptible to brute force attacks, dictionary attacks, password guessing and user memory fatigue. Users create a personalized password by selecting a sequence of images or points in an image grid, which enhances security due to the complexity of graphical choices over traditional textual passwords. Graphical Password Based Authenticat
APA, Harvard, Vancouver, ISO, and other styles
6

Dias, Norman Ignatius, Mouleeswaran Singanallur Kumaresan, and Reeja Sundaran Rajakumari. "Deep learning based graphical password authentication approach against shoulder-surfing attacks." Multiagent and Grid Systems 19, no. 1 (2023): 99–115. http://dx.doi.org/10.3233/mgs-230024.

Full text
Abstract:
The password used to authenticate users is vulnerable to shoulder-surfing assaults, in which attackers directly observe users and steal their passwords without using any other technical upkeep. The graphical password system is regarded as a likely backup plan to the alphanumeric password system. Additionally, for system privacy and security, a number of programs make considerable use of the graphical password-based authentication method. The user chooses the image for the authentication procedure when using a graphical password. Furthermore, graphical password approaches are more secure than t
APA, Harvard, Vancouver, ISO, and other styles
7

Priyanka Shingate, Shruti Taware, Pratik Deshpande, Tanaya Deshmukh, and Anshu Thakur. "A Research on Graphical Password Strategy Authentication." International Journal of Scientific Research in Science, Engineering and Technology 11, no. 3 (2024): 237–48. http://dx.doi.org/10.32628/ijsrset24113120.

Full text
Abstract:
In an ever-evolving digital realm, ensuring the security and reliability of software applications has become increasingly crucial. The continuous advancement of technology also brings about more complex cyber threats, emphasizing the urgent need to identify and address vulnerabilities. In response to this growing imperative, we introduce "Graphical Password Authenticator: A Novel Approach to Secure User Authentication." The Graphical Password Authenticator reimagines the conventional user authentication process by utilizing graphical elements and innovative techniques. It provides a secure and
APA, Harvard, Vancouver, ISO, and other styles
8

Prof., Sarita T. Sawale, Kalyani J. Anpat Ms., and Priyanka Savaji Ms. "SURVEY OF GRAPHICAL PASSWORD." International Journal of Advances in Engineering & Scientific Research 2, no. 3 (2015): 01–09. https://doi.org/10.5281/zenodo.10725847.

Full text
Abstract:
<strong><em>Abstract</em><em>: </em></strong> <em>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Over the years security experts in the field of information technology have had a tough time to making passwords secure. Graphical passwords have been designed to try to make passwords more remarkable and more comfortable for people to use and, therefore, more secure. Passwords provide security mechanism for authentication and protection services against unwanted access to resources. A graphical based password is one promising alte
APA, Harvard, Vancouver, ISO, and other styles
9

Jaiswal, Sarveshkumar, Tejas Chore, Kamalesh Patil, and Kunal Jagtap. "Authentication Based on Image Password." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 3941–46. http://dx.doi.org/10.22214/ijraset.2023.52462.

Full text
Abstract:
Abstract: In the modern day, graphical password authentication that relies on memory or recognition is a different and still developing sort of authentication. The user copies the picture or is able to identify the image that was used or made during the registration process. Only authorised users are able to access resources and information thanks to passwords. The newest fashion is graphic passwords, which appear to be a highly promising authentication technique. It is available as a substitute for text passwords. The most popular method is using usernames and passwords that are alphanumeric.
APA, Harvard, Vancouver, ISO, and other styles
10

Jaiswal, Sarveshkumar, Tejas Chore, Kamalesh Patil, and Kunal Jagtap. "Authentication Based on Image Password." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 3910–17. http://dx.doi.org/10.22214/ijraset.2023.52227.

Full text
Abstract:
Abstract: In the modern day, graphical password authentication that relies on memory or recognition is a different and still developing sort of authentication. The user copies the picture or is able to identify the image that was used or made during the registration process. Only authorised users are able to access resources and information thanks to passwords. The newest fashion is graphic passwords, which appear to be a highly promising authentication technique. It is available as a substitute for text passwords. The most popular method is using usernames and passwords that are alphanumeric.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Graphical Password Authentication"

1

Alsaiari, Hussain. "Graphical one-time password authentication." Thesis, University of Plymouth, 2016. http://hdl.handle.net/10026.1/8145.

Full text
Abstract:
Complying with a security policy often requires users to create long and complex passwords to protect their accounts. However, remembering such passwords appears difficult for many and may lead to insecure practices, such as choosing weak passwords or writing them down. One-Time Passwords (OTPs) aim to overcome such problems; however, most implemented OTP techniques require special hardware, which not only adds costs, but also raises issues regarding availability. This type of authentication mechanism is mostly adopted by online banking systems to secure their clients’ accounts. However, carry
APA, Harvard, Vancouver, ISO, and other styles
2

Suo, Xiaoyuan. "A Design and Analysis of Graphical Password." Digital Archive @ GSU, 2006. http://digitalarchive.gsu.edu/cs_theses/27.

Full text
Abstract:
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend to pick passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to remember. To address this problem, some researchers have developed authentication methods that use pictures as passwords. In this paper, I conduct a comprehensive survey of the existing graphical password techniques. I classify these techniques into two categories: recognition-based and recall-base
APA, Harvard, Vancouver, ISO, and other styles
3

Komanduri, Saranga. "Improving Password Usability with Visual Techniques." Bowling Green State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1194297698.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Alesand, Elias, and Hanna Sterneling. "A shoulder-surfing resistant graphical password system." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-138163.

Full text
Abstract:
The focus of this report is to discuss graphical password systems and how they can contribute to handle security problems that threaten authentication processes. One such threat is shoulder-surfing attacks, which are also reviewed in this report. Three already existing systems that are claimed to be shoulder-surfing resilient are described and a new proposed system is presented and evaluated through a user study. Moreover, the system is compared to the mentioned existing systems to further evaluate the usability, memorability and the time it takes to authenticate. The user study shows that tes
APA, Harvard, Vancouver, ISO, and other styles
5

Вітович, М. М. "Метод автентифікації користувачів Android". Thesis, ВНТУ, 2017. https://conferences.vntu.edu.ua/index.php/all-fitki/all-fitki-2017/paper/view/3206.

Full text
Abstract:
Проаналізовано найпоширеніші методи автентифікації користувачів в ОС Android. Проведено аналіз переваг та недоліків кожного з методів, а також запропоновано власний метод автентифікації користувачів в ОС Android.<br>This research paper describes a common user authentication methods in the Android OS. An analysis of the advantages and disadvantages of each method, as well as offer their own user authentication method on the Android OS.
APA, Harvard, Vancouver, ISO, and other styles
6

Вітович, М. М. "Метод автентифікації користувачів Android". Thesis, ВНТУ, 2017. http://ir.lib.vntu.edu.ua//handle/123456789/24296.

Full text
Abstract:
Проаналізовано найпоширеніші методи автентифікації користувачів в ОС Android. Проведено аналіз переваг та недоліків кожного з методів, а також запропоновано власний метод автентифікації користувачів в ОС Android<br>This research paper describes a common user authentication methods in the Android OS. An analysis of the advantages and disadvantages of each method, as well as offer their own user authentication method on the Android OS.
APA, Harvard, Vancouver, ISO, and other styles
7

Gurary, Jonathan Gurary. "Improving the Security of Mobile Devices Through Multi-Dimensional and Analog Authentication." Cleveland State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=csu1521564381685222.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jali, Mohd Zalisham. "A study of graphical alternatives for user authentication." Thesis, University of Plymouth, 2011. http://hdl.handle.net/10026.1/881.

Full text
Abstract:
Authenticating users by means of passwords is still the dominant form of authentication despite its recognised weaknesses. To solve this, authenticating users with images or pictures (i.e. graphical passwords) is proposed as one possible alternative as it is claimed that pictures are easy to remember, easy to use and has considerable security. Reviewing literature from the last twenty years found that few graphical password schemes have successfully been applied as the primary user authentication mechanism, with many studies reporting that their proposed scheme was better than their predecesso
APA, Harvard, Vancouver, ISO, and other styles
9

Sparks, Jonathan William. "The Impact of Image Synonyms in Graphical-Based Authentication Systems." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/33.

Full text
Abstract:
Traditional text-based passwords used for authentication in information systems have several known issues in the areas of usability and security. Research has shown that when users generate passwords for systems, they tend to create passwords that are subject to compromise more so than those created randomly by the computer. Research has also shown that users have difficulty remembering highly secure, randomly created, text-based passwords. Graphical-based passwords have been shown to be highly memorable for users when applied to system authentication. However, graphical-based authentication s
APA, Harvard, Vancouver, ISO, and other styles
10

Svensson, Rickard. "Cued Click-Point Memorability." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-47604.

Full text
Abstract:
The Safety of passwords has been in question for over 40 years, long before the Internet. While improvements have been made to ensure security nothing has changed with passwords since the emergence of the Internet. Passwords need to be long and complex to be secure and users should not reuse their passwords. In a world where there are thousands of services on the internet requiring authentication to keep passwords safe users will have to remember a lot of passwords. Studies show however that users are prone to both create bad passwords but to also reuse their passwords on different sites. A lo
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Graphical Password Authentication"

1

Patil, Nikhil, Ganesh Bhutkar, Priyanshi Patil, Parth Pishte, and Apoorva Popalghat. "Graphical-Based Password Authentication." In ICT Analysis and Applications. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-6568-7_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lapin, Kristina, and Manfredas Šiurkus. "Balancing Usability and Security of Graphical Passwords." In Digital Interaction and Machine Intelligence. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-11432-8_15.

Full text
Abstract:
AbstractAlthough most widely used authentication involves characters as passwords, but secure text-based passwords are complex and difficult to remember. Users want to have easy to remember passwords, but these are vulnerable to various kinds of attacks and are predictable. To address these problems, graphical passwords that involve selection of images and drawing lines have been proposed. The encoded images support creation of secure passwords and facilitate their memorability. Thus, they are considered as an alternative to strengthen password security while preserving usability because secure textual passwords become more complicated to use. The research addresses the issue of improving the user experiences during graphical authentication. This paper examines cued recall-based, pure recall-based and recognition-based approaches. The proposed scheme is based on recognition-based scheme that is selected as the least vulnerable to various attacks. The solution is currently under development, two qualitative usability testing sessions are performed and the participants’ feedback is discussed.
APA, Harvard, Vancouver, ISO, and other styles
3

Patel, Shikhar Singh, Akarsh Jaiswal, Yash Arora, and Bharti Sharma. "Survey on Graphical Password Authentication System." In Data Intelligence and Cognitive Informatics. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8530-2_55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yadav, Bipin, Kaptan Singh, and Amit Saxena. "Video Based Graphical Password Authentication System." In Proceedings of International Conference on Network Security and Blockchain Technology. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-3182-6_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Patel, Shikhar Singh, Akarsh Jaiswal, Yash Arora, and Bharti Sharma. "Survey on Graphical Password Authentication System." In Data Intelligence and Cognitive Informatics. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8530-2_55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chiasson, Sonia, P. C. van Oorschot, and Robert Biddle. "Graphical Password Authentication Using Cued Click Points." In Computer Security – ESORICS 2007. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74835-9_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kameswara Rao, M., Ch Vidya Pravallika, G. Priyanka, and Mani Kumar. "A Shoulder-Surfing Resistant Graphical Password Authentication Scheme." In Advances in Intelligent Systems and Computing. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0419-3_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gala, Aaroh, and Somdev Mehta. "Smart Authentication Using Graphical Password for Android Devices." In Emerging Research in Computing, Information, Communication and Applications. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-4741-1_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Poonkuzhali, S., A. Abuthahir, S. P. Dinesh, and D. Daadreyaa. "Enhanced Graphical Password Authentication System Based on Puzzles." In Disruptive Technologies for Sustainable Development. CRC Press, 2024. http://dx.doi.org/10.1201/9781003428473-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Srinivasa Ravi Kiran, T., A. Srisaila, and A. Lakshmanarao. "Implementing Multilevel Graphical Password Authentication Scheme in Combination with One Time Password." In Advances in Intelligent Systems and Computing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2594-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Graphical Password Authentication"

1

V, Jananee, Ragava Krishnan N S, and Rakesh V S. "AI-Powered Dynamic Images: A New Frontier in Graphical Password Authentication." In 2024 International Conference on Emerging Research in Computational Science (ICERCS). IEEE, 2024. https://doi.org/10.1109/icercs63125.2024.10894909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

F.Abbas, Safa, and Lahieb M.Jawad. "Hybrid Graphical Password Authentication Technique Based On GLCM And Canny Edge Detection." In 2024 1st International Conference on Emerging Technologies for Dependable Internet of Things (ICETI). IEEE, 2024. https://doi.org/10.1109/iceti63946.2024.10777187.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dhinesh, M., B. Geetha, Sathish P, Lavanya Saravanakumar, P. Sebastian Vindro Jude, and Allam Balaram. "ImageGuard: Advanced User Authentication via Dynamic Graphical Password Manipulation and Secured Image Sequences." In 2025 4th International Conference on Sentiment Analysis and Deep Learning (ICSADL). IEEE, 2025. https://doi.org/10.1109/icsadl65848.2025.10933219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nagelli, Archana, Siva Karthik R N V, Kalyan Kathuroji, Sanjay Reddy Buttreddy, and Rishivardhan Reddy Marri. "Survey on Graphical Password Authentication Examining Methods, Safety Precautions, and Views from Users in Contemporary Systems." In 2024 International Conference on Recent Innovation in Smart and Sustainable Technology (ICRISST). IEEE, 2024. https://doi.org/10.1109/icrisst59181.2024.10922036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Khedkar, Rutuja, Aditya Pawar, Krishna Dharmale, Nikhil Gaikwad, and Anushka Kangane. "A Comprehensive Survey of Graphical Passwords Authentication Systems that Provides Security." In 2024 International Conference on Expert Clouds and Applications (ICOECA). IEEE, 2024. http://dx.doi.org/10.1109/icoeca62351.2024.00036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kayode Alese, Boniface, Adewumi Adewale Omojowo, Tosin Akinwale Adesuyi, Aderonke Favour-Bethy Thompson, Sunday Olumide Adewale, and Festus A. Osuolale. "An Enhanced Graphical Password Technique Using Fake Pointers." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2221.

Full text
Abstract:
Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset, such as person, community, nation, or organization. Thus, the determination of a user being allowed access to a resource(s) is done cautiously. Alphanumeric password has been used for authentication, however, it is inherently limited. Graphical password is a possible alternative. Consequently, this paper designs a new graphical password technique based on images, rather than alphanumeric strings. Although, graphical password technique is more secure than textual password. It is al
APA, Harvard, Vancouver, ISO, and other styles
7

Almulhem, Ahmad. "A graphical password authentication system." In 2011 World Congress on Internet Security (WorldCIS-2011). IEEE, 2011. http://dx.doi.org/10.1109/worldcis17046.2011.5749855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gurav, Shraddha M., Leena S. Gawade, Prathamey K. Rane, and Nilesh R. Khochare. "Graphical Password Authentication: Cloud Securing Scheme." In 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies (ICESC). IEEE, 2014. http://dx.doi.org/10.1109/icesc.2014.90.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Joshi, Abhilash M., and Balachandra Muniyal. "Authentication Using Text and Graphical Password." In 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2018. http://dx.doi.org/10.1109/icacci.2018.8554390.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Desai, Viraja, Atharva Kothawade, Shruti Mhetre, and Mahesh Gangarde. "A graphical password authentication using blockchain." In 4TH INTERNATIONAL CONFERENCE ON INNOVATION IN IOT, ROBOTICS AND AUTOMATION (IIRA 4.0). AIP Publishing, 2025. https://doi.org/10.1063/5.0246318.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!