To see the other types of publications on this topic, follow the link: Graphical Password Authentication.

Journal articles on the topic 'Graphical Password Authentication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Graphical Password Authentication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Bhardwaj, Utkarsh. "Graphical Password Authentication." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 4656–61. http://dx.doi.org/10.22214/ijraset.2023.51883.

Full text
Abstract:
Abstract: A graphical password authentication is a form of authentication where users select a picture, image, or sequence as their password. Graphical passwords are an alternative to alphanumeric passwords in which users click on graphical images rather than typing alphanumeric characters to authenticate their identity. This method has gained popularity due to its ease of use and ability to provide better security than traditional alphanumeric passwords. This research paper provides a comprehensive study of graphical password authentication, including its history, types, advantages and disadv
APA, Harvard, Vancouver, ISO, and other styles
2

Taware, Shruti. "A Survey on Graphical Password Strategy Authentication." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem35080.

Full text
Abstract:
In an ever-evolving digital realm, ensuring the security and reliability of software applications has become increasingly crucial. The continuous advancement of technology also brings about more complex cyber threats, emphasizing the urgent need to identify and address vulnerabilities. In response to this growing imperative, we introduce "Graphical Password Authenticator: A Novel Approach to Secure User Authentication." The Graphical Password Authenticator reimagines the conventional user authentication process by utilizing graphical elements and innovative techniques. It provides a secure and
APA, Harvard, Vancouver, ISO, and other styles
3

Sekhar Reddy, Y. Chandra, M. Venkateswara Rao, M. Kameswara Rao, C. V. Phaneendra Kumar, and A. Anil Sai. "Graphical Password Using Captcha." International Journal of Advances in Applied Sciences 5, no. 2 (2016): 94. http://dx.doi.org/10.11591/ijaas.v5.i2.pp94-100.

Full text
Abstract:
In this 21st century one of the main issue to tackle was Cyber Security attack. We have numerous authentication processes like two key factor passwords, graphical passwords and many other. Text based passwords are prone to many attacks like dictionary attacks. In this paper, we have implemented a new authentication method namely; a family of graphical passwords built on Captcha technology. As graphical password addresses many security problems like online guessing attacks, relay attacks etc. Captcha is used to distinguish humans and bots. So, we use images with captcha’s as one of the authenti
APA, Harvard, Vancouver, ISO, and other styles
4

Nandi, Pathik, and Dr Preeti Savant. "Graphical Password Authentication System." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1759–65. http://dx.doi.org/10.22214/ijraset.2022.41621.

Full text
Abstract:
Abstract: Graphical password is one of technic for authentication of computer security. Now days digital/computer security is most important things in computer science for protected user or customer data. And Shoulder-surfing is a one of the threats where a criminal can steal a password by direct observation or by recording the authentication session. There are several techniques available for this authentication, the most prevalent and simple of which is the Graphical password technique. So, we suggest a new technique to combat this problem. We have developed two concepts to combat shoulder s
APA, Harvard, Vancouver, ISO, and other styles
5

Gopalakrishnan, Adithya, Anugraha K Anil, Anu Thomas, Devika Vijayan ,, and Mafnitha K K. "Graphical Password Authentication: Strengthening Security in the Digital Age." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem43155.

Full text
Abstract:
Authentication is vital for maintaining system secu- rity. Graphical password-based authentication systems provide a promising alternative to traditional authentication methods such as alphanumeric or text-based passwords. Conventional authentication systems are susceptible to brute force attacks, dictionary attacks, password guessing and user memory fatigue. Users create a personalized password by selecting a sequence of images or points in an image grid, which enhances security due to the complexity of graphical choices over traditional textual passwords. Graphical Password Based Authenticat
APA, Harvard, Vancouver, ISO, and other styles
6

Dias, Norman Ignatius, Mouleeswaran Singanallur Kumaresan, and Reeja Sundaran Rajakumari. "Deep learning based graphical password authentication approach against shoulder-surfing attacks." Multiagent and Grid Systems 19, no. 1 (2023): 99–115. http://dx.doi.org/10.3233/mgs-230024.

Full text
Abstract:
The password used to authenticate users is vulnerable to shoulder-surfing assaults, in which attackers directly observe users and steal their passwords without using any other technical upkeep. The graphical password system is regarded as a likely backup plan to the alphanumeric password system. Additionally, for system privacy and security, a number of programs make considerable use of the graphical password-based authentication method. The user chooses the image for the authentication procedure when using a graphical password. Furthermore, graphical password approaches are more secure than t
APA, Harvard, Vancouver, ISO, and other styles
7

Priyanka Shingate, Shruti Taware, Pratik Deshpande, Tanaya Deshmukh, and Anshu Thakur. "A Research on Graphical Password Strategy Authentication." International Journal of Scientific Research in Science, Engineering and Technology 11, no. 3 (2024): 237–48. http://dx.doi.org/10.32628/ijsrset24113120.

Full text
Abstract:
In an ever-evolving digital realm, ensuring the security and reliability of software applications has become increasingly crucial. The continuous advancement of technology also brings about more complex cyber threats, emphasizing the urgent need to identify and address vulnerabilities. In response to this growing imperative, we introduce "Graphical Password Authenticator: A Novel Approach to Secure User Authentication." The Graphical Password Authenticator reimagines the conventional user authentication process by utilizing graphical elements and innovative techniques. It provides a secure and
APA, Harvard, Vancouver, ISO, and other styles
8

Prof., Sarita T. Sawale, Kalyani J. Anpat Ms., and Priyanka Savaji Ms. "SURVEY OF GRAPHICAL PASSWORD." International Journal of Advances in Engineering & Scientific Research 2, no. 3 (2015): 01–09. https://doi.org/10.5281/zenodo.10725847.

Full text
Abstract:
<strong><em>Abstract</em><em>: </em></strong> <em>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Over the years security experts in the field of information technology have had a tough time to making passwords secure. Graphical passwords have been designed to try to make passwords more remarkable and more comfortable for people to use and, therefore, more secure. Passwords provide security mechanism for authentication and protection services against unwanted access to resources. A graphical based password is one promising alte
APA, Harvard, Vancouver, ISO, and other styles
9

Jaiswal, Sarveshkumar, Tejas Chore, Kamalesh Patil, and Kunal Jagtap. "Authentication Based on Image Password." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 3941–46. http://dx.doi.org/10.22214/ijraset.2023.52462.

Full text
Abstract:
Abstract: In the modern day, graphical password authentication that relies on memory or recognition is a different and still developing sort of authentication. The user copies the picture or is able to identify the image that was used or made during the registration process. Only authorised users are able to access resources and information thanks to passwords. The newest fashion is graphic passwords, which appear to be a highly promising authentication technique. It is available as a substitute for text passwords. The most popular method is using usernames and passwords that are alphanumeric.
APA, Harvard, Vancouver, ISO, and other styles
10

Jaiswal, Sarveshkumar, Tejas Chore, Kamalesh Patil, and Kunal Jagtap. "Authentication Based on Image Password." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 3910–17. http://dx.doi.org/10.22214/ijraset.2023.52227.

Full text
Abstract:
Abstract: In the modern day, graphical password authentication that relies on memory or recognition is a different and still developing sort of authentication. The user copies the picture or is able to identify the image that was used or made during the registration process. Only authorised users are able to access resources and information thanks to passwords. The newest fashion is graphic passwords, which appear to be a highly promising authentication technique. It is available as a substitute for text passwords. The most popular method is using usernames and passwords that are alphanumeric.
APA, Harvard, Vancouver, ISO, and other styles
11

Jirjees, Seerwan Waleed, Ali Majeed Mahmood, and Ahmed Raoof Nasser. "Passnumbers: An Approach of Graphical Password Authentication Based on Grid Selection." International Journal of Safety and Security Engineering 12, no. 1 (2022): 21–29. http://dx.doi.org/10.18280/ijsse.120103.

Full text
Abstract:
The authentication textual passwords are the most widely used technique. However, this type of legacy authentication is vulnerable to various attacks, such as shoulder-surfing attacks. Hence, graphical password authentication is one of these approaches which has been suggested to overcome the issues related to textual passwords. Nevertheless, the hackers have also developed new techniques that can be finally broken the graphical password, for instance, listening to the transmitted information between the client and the server. In this paper, Passnumbers graphical authentication password is pro
APA, Harvard, Vancouver, ISO, and other styles
12

Nguyen, Thanh An, and Yong Zeng. "A VISION BASED GRAPHICAL PASSWORD." Journal of Integrated Design and Process Science: Transactions of the SDPS, Official Journal of the Society for Design and Process Science 14, no. 2 (2010): 43–52. http://dx.doi.org/10.3233/jid-2010-14204.

Full text
Abstract:
Graphical password is an authentication means alternative to textual password and biometric password. Graphical passwords are classified into two groups: picture based password and user-drawn based password. To pass the authentication, in the picture based graphical password, users have to choose right photos whereas in the user-drawn based graphical password, users have to draw correct pictures. In this paper, we propose a new user-drawn based graphical password. The proposed scheme requires users to create their secret by selecting individual points or by connecting points into curves from a
APA, Harvard, Vancouver, ISO, and other styles
13

Lin, Tsung-Hung, Cheng-Chi Lee, Chwei-Shyong Tsai, and Shin-Dong Guo. "A tabular steganography scheme for graphical password authentication." Computer Science and Information Systems 7, no. 4 (2010): 823–41. http://dx.doi.org/10.2298/csis081223028l.

Full text
Abstract:
Authentication, authorization and auditing are the most important issues of security on data communication. In particular, authentication is the life of every individual essential closest friend. The user authentication security is dependent on the strength of user password. A secure password is usually random, strange, very long and difficult to remember. For most users, remember these irregular passwords are very difficult. To easily remember and security are two sides of one coin. In this paper, we propose a new graphical password authentication protocol to solve this problem. Graphical pas
APA, Harvard, Vancouver, ISO, and other styles
14

Sagar, U.P. Prashasthi, U.P. Pravardha Sagar, and Preeti Dubey. "Image-based Object-sequenced Graphical Password Authentication System." International Journal of Microsystems and IoT 2, no. 4 (2024): 730–44. https://doi.org/10.5281/zenodo.11651505.

Full text
Abstract:
Textual passwords (one of the knowledge-based passwords) have been predictable and have long sustained security breaches due to their predictability (password dictionary attacks) and the possibility of shoulder-surfing and other such attacks. Biometric passwords are too rigid and can&rsquo;t be duplicated but are expensive and cannot be applied to smaller, cost-effective systems. Whereas, Graphical Passwords are reliable, memorable and are known to improve one&rsquo;s cognition, hence very convenient to the user.&nbsp; Hybrid Authentication methods are proven to be far more secure than any oth
APA, Harvard, Vancouver, ISO, and other styles
15

R, Sneha. "A Graphical Password Authentication System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30440.

Full text
Abstract:
Graphical passwords provide a promising alternative to traditional alphanumeric passwords. They are attractive since people usually remember pictures better than words.In this extended abstract, we propose a simple graphical password authentication system. We describe its operation with some examples, and highlight important aspects of the system.
APA, Harvard, Vancouver, ISO, and other styles
16

Golar, Priti C., and Rika Sharma. "An Advanced Knowledge Based Graphical Authentication Framework with Guaranteed Confidentiality and Integrity." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (2023): 720–30. http://dx.doi.org/10.17762/ijritcc.v11i8s.7676.

Full text
Abstract:
The information and security systems largely rely on passwords,which remain the fundamental part of any authentication process. The conventional authentication method based on alphanumerical username and password suffer from significant disadvantages. The graphical password-based authentication system has recently been introduced as an effective alternative. Although the graphical schemes effectively generate the passwords with better flexibility and enhanced security, the most common problem with this is the shoulder surfing attack. This paper proposes an effective 3D graphical password authe
APA, Harvard, Vancouver, ISO, and other styles
17

Prashasthi, Sagar U. P., Sagar U. P. Pravardha, and P. Dubey. "Image-based Object-sequenced Graphical Password Authentication System." International Journal of Microsystems and IoT 2, no. 7 (2024): 1033–43. https://doi.org/10.5281/zenodo.13331483.

Full text
Abstract:
&nbsp;&nbsp; Textual passwords (one of the knowledge-based passwords) have been predictable and have long sustained security breaches due to their predictability (password dictionary attacks) and the possibility of shoulder-surfing and other such attacks. Biometric passwords are too rigid and can&rsquo;t be duplicated but are expensive and cannot be applied to smaller, cost-effective systems. Whereas Graphical Passwords are reliable, memorable and are known to improve one&rsquo;s cognition, hence very convenient to the user.&nbsp; Hybrid Authentication methods are proven to be far more secure
APA, Harvard, Vancouver, ISO, and other styles
18

Kumar, Aayush, Keshav Kumar, Siddharth Shekhar Singh, and M. Vaneeta. "An Efficient Graphical Authentication System." Asian Journal of Science and Applied Technology 6, no. 1 (2017): 42–45. http://dx.doi.org/10.51983/ajsat-2017.6.1.937.

Full text
Abstract:
Password authentication is majorly used in applications for computer security and privacy. However, human actions such as selecting bad passwords and inputting passwords in an insecure way are considered as” the weakest link” in the authentication process. Rather than arbitrary alphanumeric string, users generally use weak password, more often based on their personal information. With new technologies coming up and mobile apps piling up, users can use the application anytime and anywhere with various devices. Although the evolution is convenient but it also increases the probability of exposin
APA, Harvard, Vancouver, ISO, and other styles
19

Werner, Steffen, Christopher Hauck, and Marshall Masingale. "Password Entry Times for Recognition-based Graphical Passwords." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (2016): 755–59. http://dx.doi.org/10.1177/1541931213601173.

Full text
Abstract:
Graphical passwords offer a more memorable alternative to traditional, text-based passwords. Among current contenders, cued-recall based click-point or gesture centered authentication systems like Microsoft’s picture gesture authentication (PGA) have been commercially more successful than recognition based systems (e.g., PassFaces). One perceived drawback of graphical authentication systems in general and especially recognition based authentication is the assumption that graphical authentication is slower and thus less user-friendly than traditional password entry via keyboard. This paper addr
APA, Harvard, Vancouver, ISO, and other styles
20

Sulochana, V. "Implementation of Chunks of Image Password in Cloud Computing System." Asian Journal of Computer Science and Technology 8, S1 (2019): 54–57. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1958.

Full text
Abstract:
This article proposed a graphical password authentication which uses chunks of images to overcome the loopholes present in the traditional authentication methods. The graphical password contains a selection of chunks of images which creates password for authenticating cloud users for accessing cloud services. The article includes the details of chunks of images authentication, algorithm and implementation of chunk of images.
APA, Harvard, Vancouver, ISO, and other styles
21

Zhou, Zhili, Ching-Nung Yang, Yimin Yang, and Xingming Sun. "Polynomial-Based Google Map Graphical Password System against Shoulder-Surfing Attacks in Cloud Environment." Complexity 2019 (November 16, 2019): 1–8. http://dx.doi.org/10.1155/2019/2875676.

Full text
Abstract:
Text password systems are commonly used for identity authentication to access different kinds of data resources or services in cloud environment. However, in the text password systems, the main issue is that it is very hard for users to remember long random alphanumeric strings due to the long-term memory limitation of the human brain. To address this issue, graphical passwords are accordingly proposed based on the fact that humans have better memory for images than alphanumeric strings. Recently, a Google map graphical password (GMGP) system is proposed, in which a specific location of Google
APA, Harvard, Vancouver, ISO, and other styles
22

Rangari, Mr Shantanu, and Prof K. R. Ingole. "Implementation of Graphical Password Authentication Technique for Security Using Cued Click Points Algorithm." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1476–79. http://dx.doi.org/10.22214/ijraset.2022.41416.

Full text
Abstract:
Abstract: In today's world, most Internet applications still establish user authentication with a traditional text-based password. Designing a secure as well as user-friendly password-based method has long been on the agenda of security researchers. On the one hand, there are password manager programs that make it easy to create site-specific strong passwords from a single user's password to eliminate the memory burden caused by multiple passwords. We offer different levels of authentication such as Textual Authentication, Image Authentication and Audio Authentication to provide better securit
APA, Harvard, Vancouver, ISO, and other styles
23

Anitha, M., and G. Saranya. "User Privileged CAPTCHA as Graphical Password for Multistage Authentication." International Journal of Advance Research and Innovation 3, no. 1 (2015): 28–33. http://dx.doi.org/10.51976/ijari.311505.

Full text
Abstract:
Nowadays, user authentication is one of the important topics in information security. In today’s world the password security is very important. For password protection various techniques are available. Cued Click Points are a click-based graphical password scheme, a cued-recall graphical password technique. Users Click on one point per image for a sequence of images. The next image is based on the previous click-point. The passwords which are easy to memorize are chosen by the users and it becomes easy for attackers to guess it, but the passwords assigned by the strong system are difficult for
APA, Harvard, Vancouver, ISO, and other styles
24

Shaik Mehboob Basha and K.Kumara Swamy. "Web Based Graphical Password Authentication System." international journal of engineering technology and management sciences 9, no. 2 (2025): 779–85. https://doi.org/10.46647/ijetms.2025.v09i02.099.

Full text
Abstract:
Graphical passwords provide a promising alternative to traditional alphanumeric passwords. Theyare attractive since people usually remember pictures better than words. In this extended abstract,we propose a simple graphical password authentication system. We describe its operation withsome examples, and highlight important aspects of the system.
APA, Harvard, Vancouver, ISO, and other styles
25

Abhishek, Narayan Shah, Anand Dipti, Samanta Sabyasachi, and Dey Dipankar. "Graphical Password Authentication System Using Modified Intuitive Approach." International Journal of HIT Transaction on ECCN Vol. 7, no. 2A (2021) (2021): 64–71. https://doi.org/10.5281/zenodo.5893206.

Full text
Abstract:
B. Tech Student, Haldia Institute of Technology, Dept. of IT, Haldia, WB, India Haldia Institute of Technology, Dept. of IT, Haldia, WB, India Global Institute of Science and Technology, Haldia, WB, India In today&rsquo;s world everything we use needs security, especially when we are using something on internet. For security purpose, we use text passwords as it is the most popular user authentication method, but have security and user friendly problems. To address this problem, some researchers have developed authentication methods that use pictures as passwords. Graphical passwords offer anot
APA, Harvard, Vancouver, ISO, and other styles
26

Santoso, Joseph Teguh, Budi Raharjo, and Agus Wibowo. "Combination of Alphanumeric Password and Graphic Authentication for Cyber Security." Journal of Internet Services and Information Security 14, no. 1 (2023): 16–36. http://dx.doi.org/10.58346/jisis.2024.i1.002.

Full text
Abstract:
The main objective of this research is to create a more secure and user-friendly password-generation method that is less vulnerable to attacks such as shoulder surfing. Similarly, while textual or alphanumeric passwords are not entirely secure, they also come with certain limitations, including issues related to memory. The novelty of this research is the development of a new algorithm (Secure Password Algorithm/SPA) for password generation that uses graphics to generate textual input from users based on user perceptions. This method is more resilient against attacks like shoulder surfing and
APA, Harvard, Vancouver, ISO, and other styles
27

Roy, Indrani, Ajmerry Hossain, and SARKER TANVEER AHMED RUMEE. "Attacks on Graphical Password: A Study on Defense Mechanisms and Limitations." International Journal of Information Technology and Applied Sciences (IJITAS) 3, no. 4 (2021): 180–83. http://dx.doi.org/10.52502/ijitas.v3i4.201.

Full text
Abstract:
User authentication is mostly reliant on password-based based verification. Users generally used text-based passwords, which are user-friendly but often predictable and vulnerable to some common attacks. To overcome these shortcomings, graphical authentication methods have emerged. Here, users choose a sequence of images as passwords. Though such methods help users to better remember their passwords, they too suffer from attacks seen in the case of textual passwords. This paper presents a comprehensive summary of the vulnerabilities state of the art graphical password schemes against the follo
APA, Harvard, Vancouver, ISO, and other styles
28

Kalimuthu, P., and A. Justin Diraviam. "Simple Authentication Technique for Session Management Using Odd and Even Pair of Random Text and Color Password in Cloud Computing." Asian Journal of Computer Science and Technology 1, no. 1 (2012): 130–34. http://dx.doi.org/10.51983/ajcst-2012.1.1.1691.

Full text
Abstract:
Simple Authentication Technique for Session Management Using Odd and Even Pair of Random Text and Color Password in Cloud Computing&#x0D; While some legal challenges in cyberspace have started to become clearer, the use of cloud computing and hosted applications adds a new dimension of legal risk. Compliance, privacy, and security problems are compounded by the use of remote, distributed services operated by third parties. Businesses employing these new technologies must look a new at their online risk, and learn how to assess and manage it. Authentication is the first line of defense against
APA, Harvard, Vancouver, ISO, and other styles
29

Sri Ram Varma, D., K. Meghana, V. Sai Deepak, and R. Murugan. "Graphical password scheme to diminish shoulder surfing." International Journal of Engineering & Technology 7, no. 1.1 (2017): 234. http://dx.doi.org/10.14419/ijet.v7i1.1.9474.

Full text
Abstract:
Many authentication schemes are known to us but none of them are completely secure. Textual password is the most common technique used by majority of the people in the industry. But Textual passwords are vulnerable to dictionary attacks, keyloggers, brute-force attacks, even guessing may work out sometimes. Alternative authentication schemes have been proposed to overcome this problem, some of them are Biometric authentication, retina based authentication, graphical password scheme ETC., Authentication Schemes such as biometric and retina scans are too costly, so they are not always preferred.
APA, Harvard, Vancouver, ISO, and other styles
30

Elugbadebo, O. J., A. A. Orunsolu, S. A. Akinyele, and S. I. Salawu. "AN EFFICIENT AND SECURED GRAPHICAL AUTHENTICATION SYSTEM." Acta Informatica Malaysia 6, no. 1 (2022): 17–21. http://dx.doi.org/10.26480/aim.01.2022.17.21.

Full text
Abstract:
Authentication through the use of passwords usually allow users to access resources in a computer or automated installations. However, remembering such passwords is often a problem for most users due to complex nature of most stong password. As a viable alternative, graphical passwords were introduced to complement the security problems in this method of authentication. Therefore, this papr proposes the concept of a graphical password authentication system using hybrid approach. This approach that allows users to identity a number of images during the registration process and then requested to
APA, Harvard, Vancouver, ISO, and other styles
31

D., Loganathan, Kulsum Umme, Ahamed Arbaz, M. Sania, and S. Shakthi. "Survey of Graphical Password Authentication Systems Suitable for Android Application." Research and Applications of Web Development and Design 6, no. 1 (2023): 31–43. https://doi.org/10.5281/zenodo.7686988.

Full text
Abstract:
<em>The introduction of android devices has changed the way the people live resulting in more interaction with android devices than ever before . Indeed we frequently access android devices in public places .The most commonly used authentication method in mobile devices is textual password. Textual password are more error prone and time consuming .A complicated textual password are difficult to memorize and remember. Textual password results in key logger attacks ,So to address these issues a wide range of Graphical schemes have been developed. shoulder surfing is possible with traditional pas
APA, Harvard, Vancouver, ISO, and other styles
32

Awan, Kamran Ahmad, Ikram Ud Din, Abeer Almogren, Neeraj Kumar, and Ahmad Almogren. "A Taxonomy of Multimedia-based Graphical User Authentication for Green Internet of Things." ACM Transactions on Internet Technology 22, no. 2 (2022): 1–28. http://dx.doi.org/10.1145/3433544.

Full text
Abstract:
Authentication receives enormous consideration from the research community and is proven to be an interesting field in today’s era. User authentication is the major concern because people have their private data on devices. To strengthen user authentication, passwords have been introduced. In the past, the text-based password was the traditional way of authentication, but this method has particular shortcomings. The graphical password has been introduced as an alternative, which uses a picture or a set of pictures to generate a password. In the future, it is a requirement of such approaches to
APA, Harvard, Vancouver, ISO, and other styles
33

L.P.Ramyasri, P., D. Malathi, J. D. Dorathi Jayaseeli, and K. Senthilkumar. "Study and Development of Graphical Authentication System for Secure File Transmission." International Journal of Engineering & Technology 7, no. 4.10 (2018): 470. http://dx.doi.org/10.14419/ijet.v7i4.10.21042.

Full text
Abstract:
The text-based password has been the most common practice from ancient days till present. Text based pass-words are also known for various threats, and it is prone to attacks like guessing attacks, dictionary attacks, social engineering attacks, brute force attacks, etc. The next immediate concept following the text based password is the graphical password schemes to improve password security and usability. In present days graphical passwords are being implemented more commonly. This approach is different from the traditional alpha numeric as it deals with images. In this paper a survey study
APA, Harvard, Vancouver, ISO, and other styles
34

Yang, Gi-Chul, and . "A New Graphical Password System Using Intersecting Points in a Signature." International Journal of Engineering & Technology 7, no. 4.39 (2018): 61–64. http://dx.doi.org/10.14419/ijet.v7i4.39.23707.

Full text
Abstract:
Background/Objectives: These days the most commonly used method of digital user authentication uses text-based passwords. Security enhancements using text-based passwordsrequire long and complex passwords, but long and complex text-based passwords are hard to remember and inconvenient to use. Therefore, authentication techniques that can replace text-based passwords are necessary. The objective of this paper is developing a user friendly graphical password system with strong security power.Methods/Statistical analysis: In order to develop a user friendly graphical password system with strong
APA, Harvard, Vancouver, ISO, and other styles
35

Hamid, S., N. Z. Bawany, and S. Khan. "AcSIS: Authentication System Based on Image Splicing." Engineering, Technology & Applied Science Research 9, no. 5 (2019): 4808–12. http://dx.doi.org/10.48084/etasr.3060.

Full text
Abstract:
Text-based passwords are widely used for the authentication of digital assets. Typically, password security and usability is a trade-off, i.e. easy-to-remember passwords have higher usability that makes them vulnerable to brute-force and dictionary attacks. Complex passwords have stronger security but poor usability. In order to strengthen the security in conjunction with the improved usability, we hereby propose a novel graphical authentication system. This system is a picture-based password scheme which comprises of the method of image splicing. Authentication data were collected from 33 dif
APA, Harvard, Vancouver, ISO, and other styles
36

Hamid, Soomaiya, Narmeen Zakaria Bawany, and Shahzeb Khan. "AcSIS: Authentication System Based on Image Splicing." Engineering, Technology & Applied Science Research 9, no. 5 (2019): 4808–12. https://doi.org/10.5281/zenodo.3510300.

Full text
Abstract:
Text-based passwords are widely used for the authentication of digital assets. Typically, password security and usability is a trade-off, i.e. easy-to-remember passwords have higher usability that makes them vulnerable to brute-force and dictionary attacks. Complex passwords have stronger security but poor usability. In order to strengthen the security in conjunction with the improved usability, we hereby propose a novel graphical authentication system. This system is a picturebased password scheme which comprises of the method of image splicing. Authentication data were collected from 33 diff
APA, Harvard, Vancouver, ISO, and other styles
37

Loganathan, D. "Graphical Password Authentication: Image Grid Based Digital Lock for Mobile Apps." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 4735–47. http://dx.doi.org/10.22214/ijraset.2023.52681.

Full text
Abstract:
Abstract: Over the past few decades, research on authentication methods has advanced significantly. While the initial focus was on using standardised password selection and management approaches to secure textual passwords, this was made possible by learning about the flaws in the existing systems based on the attacks performed on the same systems' vulnerabilities. With the rise of biometric-based authentication, the next stage in the study and development of improved solutions has begun. Although initially rather entertaining, this authentication method is very insecure. Once a person's biome
APA, Harvard, Vancouver, ISO, and other styles
38

TUSHAR, R. MAHORE, and A.V.DEORANKAR PROF. "SECURE GRAPHICAL PASSWORD SCHEME." JournalNX - A Multidisciplinary Peer Reviewed Journal 3, no. 3 (2017): 144–47. https://doi.org/10.5281/zenodo.1463739.

Full text
Abstract:
In the world of computer applications authentication is the main process of granting access for an individual to get control over the services provided by different service providers. It is the process of identification of particular individual, unique username and password are used. Username and text-based password are the most commonly used technique in authentication, use of this technique is very popular in web applications. Lots of work has been done in the field of authentication. Conventional technique includes the text-based password, which is the combination of alphanumeric letters. O
APA, Harvard, Vancouver, ISO, and other styles
39

Rangari, Mr Shantanu, and Prof K. R. Ingole. "Review Paper Graphical Password Authentication Technique for Security." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (2022): 1980–82. http://dx.doi.org/10.22214/ijraset.2022.40969.

Full text
Abstract:
Abstract: In modern age user authentication is a mandatory attribute in the area of data security. The characteristics of finding an individual generally based on a user id and password which is commonly used methodology for identifying users in system. Text based password is a general authentication method used from early times. There are numerous authentication systems like biometric, textual, graphical, smart card etc. Graphical password is an alternative to alphanumeric password which is tough to remember and generally forget by users as times passes. But in graphical password there is les
APA, Harvard, Vancouver, ISO, and other styles
40

Maw, Maw Naing, and Win Ohnmar. "Graphical Password Authentication using image Segmentation for Web Based Applications." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 1461–64. https://doi.org/10.5281/zenodo.3591236.

Full text
Abstract:
One of the most important topics in information security today is user authentication. User authentication is a fundamental component in most computer security contexts. It provides the basis for access control and user accountability. While there are various types of user authentication systems, alphanumeric passwords are the most common type of user authentication. They are versatile and easy to implement and use. However, it can either be long and secure or short and hard to remember. A graphical based password is one promising alternatives of textual passwords. According to human psycholog
APA, Harvard, Vancouver, ISO, and other styles
41

Herrera-Macías, Joaquín Alberto, Carlos Miguel Legón-Pérez, Lisset Suárez-Plasencia, Luis Ramiro Piñeiro-Díaz, Omar Rojas, and Guillermo Sosa-Gómez. "Test for Detection of Weak Graphic Passwords in Passpoint Based on the Mean Distance between Points." Symmetry 13, no. 5 (2021): 777. http://dx.doi.org/10.3390/sym13050777.

Full text
Abstract:
This work demonstrates the ineffectiveness of the Ripley’s K function tests, the distance to the nearest neighbor, and the empty space function in the Graphical Authentication scenario with Passpoint for the detection of non-random graphical passwords. The results obtained show that none of these tests effectively detect non-random graphical passwords; the reason for their failure is attributed to the small sample of the spatial pattern in question, where only the five points of the graphical password are analyzed. Consequently, a test based on mean distances is proposed, whose experiments sho
APA, Harvard, Vancouver, ISO, and other styles
42

Saha, Hasi, Ganesh Chandra Saha, Roshidul H, and Zakirul Islsam. "USER AUTHENTICATION THROUGH CUED CLICK POINTS BASED GRAPHICAL PASSWORD." American Journal of Agricultural Science, Engineering, and Technology 3, no. 1 (2017): 1–12. http://dx.doi.org/10.54536/ajaset.v3i1.38.

Full text
Abstract:
User authentication is a fundamental component in most computer security context. In recent years, computer and network security has been formulated as a technical problem. A key area in security research is authentication which is the determination of whether a user should be allowed access to a given system or resource. In this respect, Authentication is a process by which a system verifies the identity of a user. Authentication may also be generalized by saying that “to authenticate” means “to authorize”. Users tend to pick passwords that can be easily guessed, on the other hand, if
APA, Harvard, Vancouver, ISO, and other styles
43

R, Poonkodi, Jawahar Sriraam S R, Deepakvel M, Gokulnath J, and Jagathishprabu S. "An Enhanced Security Model for Simple Reformation-Based Password Scheme using PHP." International Journal of Computer Science and Mobile Computing 11, no. 5 (2022): 40–50. http://dx.doi.org/10.47760/ijcsmc.2022.v11i05.004.

Full text
Abstract:
Lack of security has become a major concern, given the prevalence of attackers, hackers, crackers, scammers and spammers. A key area in security research and practice is authentication, the determination of whether a user should be allowed to access a given system or resource. Existing authentication processes are usually accomplished by user ID and password, with the authentication schemes Pair-based Authentication scheme based. Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering an
APA, Harvard, Vancouver, ISO, and other styles
44

F. Abbas, Safa, and Lahieb M. Jawad. "PASS POINT SELECTION OF AUTOMATIC GRAPHICAL PASSWORD AUTHENTICATION TECHNIQUE BASED ON HISTOGRAM METHOD." Iraqi Journal of Information and Communication Technology 6, no. 1 (2023): 28–39. http://dx.doi.org/10.31987/ijict.6.1.212.

Full text
Abstract:
Graphical passwords, as opposed to textual passwords, require the user to pick pictures or draw symbols rather than input written letters. They are an option that may be explored in order to get over the issues that are caused by the system of passwords that are based on text. It has been hypothesized that graphical passwords are more difficult to crack using a brute force technique or to figure out through guessing. This paper proposes an authentication system based on a graphical password method. The proposed system computes the password points using histogram arithmetic and encrypts the cho
APA, Harvard, Vancouver, ISO, and other styles
45

Khodadadi, Touraj, A. K. M. Muzahidul Islam, Sabariah Baharun, and Shozo Komaki. "Evaluation of Recognition-Based Graphical Password Schemes in Terms of Usability and Security Attributes." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (2016): 2939. http://dx.doi.org/10.11591/ijece.v6i6.11227.

Full text
Abstract:
&lt;p&gt;User Authentication is a critical component in information security. Several widely used mechanisms for security to protect services from illegal access include alphanumerical usernames passwords. However, there are several drawbacks attached in this method. For instance, the users themselves usually those passwords that are easy to guess. As difficult passwords are difficult to recall. A new alternative is the graphic-based password and there has been a growing trend in the use of such a password. The human psychology study reveals that humans find it easier to remember pictures as o
APA, Harvard, Vancouver, ISO, and other styles
46

Khodadadi, Touraj, A. K. M. Muzahidul Islam, Sabariah Baharun, and Shozo Komaki. "Evaluation of Recognition-Based Graphical Password Schemes in Terms of Usability and Security Attributes." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (2016): 2939. http://dx.doi.org/10.11591/ijece.v6i6.pp2939-2948.

Full text
Abstract:
&lt;p&gt;User Authentication is a critical component in information security. Several widely used mechanisms for security to protect services from illegal access include alphanumerical usernames passwords. However, there are several drawbacks attached in this method. For instance, the users themselves usually those passwords that are easy to guess. As difficult passwords are difficult to recall. A new alternative is the graphic-based password and there has been a growing trend in the use of such a password. The human psychology study reveals that humans find it easier to remember pictures as o
APA, Harvard, Vancouver, ISO, and other styles
47

Kim, Si Wan, Hyun Yi Yi, Gun Il Ma, and Jeong Hyun Yi. "Shoulder-Surfing Resistant Smartphone Authentication Scheme Using Virtual Joystick." Applied Mechanics and Materials 284-287 (January 2013): 3497–501. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3497.

Full text
Abstract:
User authentication techniques such as the setting of passwords are gradually gaining importance as a means of managing important information stored in smartphones. Existing text–based password authentication schemes have the advantages of being quick and easy to use. However, they are problematic in that passwords are easily exposed to shoulder-surfing attack. In addition, a graphical password authentication scheme has the limitation of being difficult to apply to mobile device environments, in which a lot of information must be remembered and small-sized screens are provided. Therefore, in t
APA, Harvard, Vancouver, ISO, and other styles
48

Johnson, Korey, and Steffen Werner. "Memorability of Alphanumeric and Composite Scene Authentication (CSA) Passcodes Over Extended Retention Intervals." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 51, no. 5 (2007): 434–38. http://dx.doi.org/10.1177/154193120705100502.

Full text
Abstract:
Current authentication strategies seek to increase security by requiring users to create more secure alphanumeric passwords. Unfortunately, the inverse relationship between alphanumeric password security and memorability prevents users from being able to create a password that is both secure and memorable. Graphical user authentication mechanisms have been explored as a means to maintain security while enhancing memorability of passcodes. Current approaches often use unrelated picture sets from which participants have to remember a subset, with mixed results. The study outlined in this paper s
APA, Harvard, Vancouver, ISO, and other styles
49

Deshmukh, P. S., Manish Dhakane, Atharv Ghute, Dipesh Gadge, and Sarthak Wankhade. "“Graphical Password Authentication using Blockchain”." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 3155–60. http://dx.doi.org/10.22214/ijraset.2024.60256.

Full text
Abstract:
Abstract: This paper proposes a novel approach to authentication by integrating graphical passwords with blockchain technology. By storing authentication data on the blockchain, we aim to enhance security and accountability. Our system offers tamper-proof records and decentralized authentication, contributing to improved security in digital systems.
APA, Harvard, Vancouver, ISO, and other styles
50

Suárez-Plasencia, Lisset, Joaquín Alberto Herrera-Macías, Carlos Miguel Legón-Pérez, Guillermo Sosa-Gómez, and Omar Rojas. "Detection of DIAG and LINE Patterns in PassPoints Graphical Passwords Based on the Maximum Angles of Their Delaunay Triangles." Sensors 22, no. 5 (2022): 1987. http://dx.doi.org/10.3390/s22051987.

Full text
Abstract:
An alternative authentication method to traditional alphanumeric passwords is graphical password authentication, also known as graphical authentication, for which one of the most valuable cued-recall techniques is PassPoints. This technique stands out for its security and usability. However, it can be violated if the user follows a predefined pattern when selecting the five points in an image as their passwords, such as the DIAG and LINE patterns. Dictionary attacks can be built using these two patterns to compromise graphical passwords. So far, no reports have been found in the state of the a
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!