This document describes a three-level security system using image-based authentication. It proposes using a sequence of click points on a series of images for login authentication. This adds a second factor of authentication using a personal handheld device. It aims to provide stronger security than text passwords alone by combining passwords, images, and device authentication. The system has three security levels that incorporate different authentication methods such as usernames, color patterns, image recognition, optical codes and character buttons.
7. Texts passwords are the most commonly used
technique for authentication and have
several drawbacks.
Graphical passwords provide a promising
alternative to traditional alphanumeric
passwords due to the fact that humans can
remember pictures better than text.
8. In this paper, we propose a simple graphical
password authentication system that
consists of a sequence of ‘n’ images and the
user have to select the click points
associated with one of the ‘n’ image in
correct sequence for successful login.
This authentication system employs the user’s
personal handheld device as the second factor of
authentication.
9. With the increasing popularity of handheld
devices such as cell phones, our approach can
be leveraged by many organizations to
overcome threats such as key-loggers,
shoulder surfing, weak passwords.
Click cued points is a click-based graphical password
scheme, a cued-recall graphical password technique.
Users Click on one point per image for a sequence
of images.
11. Security-sensitive environments protect their access
control mechanisms. resources against
unauthorized access by enforcing
Text based passwords are not secure enough for
such applications.
User authentication can be improved by using both
text passwords and structured images.
12. The existing system is Pass Points.
It proposed Passwords which could be
composed of several points anywhere on
an Image.
They also proposed a scheme with
three overlapping grids, allowing for
login attempts that were approximately
correct to be accepted
14. A password authentication system should
encourage strong
passwords while maintaining memo ability.
We propose that authentication schemes allow
user choice while influencing users toward
stronger passwords
In our system, the task of selecting weak
passwords (which are easy for attackers to
predict) is more tedious, discouraging users
from making such choices. In effect, this
approach