SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3005-3007
ISSN: 2249-6645

A Graphical Password Scheme using Persuasive Cued
Click Points
Moulisai Rachagundla1, Syed Gulam Gouse2
1

M.Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India.
Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India.

2

ABSTRACT: Despite the ubiquity of password systems, knowledge-based authentication mechanism remains an important
and active research area. Many current systems have low level security, and even then users often devise insecure coping
strategies in order to compensate for memorability and usability problems. Alternatives such as tokens or biometrics raise
other issues such as privacy and loss. Various graphical password mechanisms have received considerable attention in
response. A systematic review of the literature on graphical passwords shows no consistency in the usability and security
evaluation of various schemes. The situation is similar for text passwords, making fair comparison between methods nearly
impossible. This paper presents a graphical password scheme using persuasive cued click points. This method is based on
knowledge based authentication.

Keywords: Authentication, Cued click points, Graphical password, Persuasive technology.
I.
INTRODUCTION
To validate the end user for authentication, we usually prefer to adopt the knowledge-based authentication
mechanism, which involves text based passwords. The text based passwords [1] are vulnerable to be hacked. The hackers
can easily guess the text passwords with other details of the system. If we want to avoid this, the system can assign a strong
password, which the hacker cannot guess. But the system assigned passwords are very difficult to memorize and also
remembered by the user. The study on the graphical password mechanisms states that the click point passwords are hard to
guess by the attacker and easy to remember for the users. So the password authentication system should encourage the strong
password selection scheme while maintaining the memorability of the user. This paper proposes the idea of persuasive
technology [2] cued click point authentication with dynamic user blocks.
This mechanism influence the user to set a random password which cannot be guessed and also being graphical, the
user can easily remember. In practical situations the same user will require different level of security for different types of
applications over the internet. But the existing system provides a concrete security level, which is same for all users and the
applications. It sets the threshold value as a fixed one whose size cannot be changed. In the proposed system the size of the
threshold value is set by the user, depending upon his/her current requirement, with the help of dynamic user blocks. To
increase the memorability of the user, audio support can also be provided, i.e. each click point is randomly associated with
an audio sound clip. So that legitimate user can be alarmed for wrong clicks.
II.
LITERATURE SURVEY
A. Token based Methods
The traditional user name /password or personal identification number (PIN) based authentication scheme is an
example of the Token Based. It is based on “something You possess”. For example, Smart Cards, a driver's license, credit
card, a university ID card etc. It allows users to enter their user name/ password in order to obtain a token which allows them
to fetch a specific resource- without using their user name and password. Once their token has been obtained, then the user
can offer the token-which offers access to a specific resource for a time period- to the remote site[3].
B. Biometrics
Biometrics is the study of automated methods for uniquely recognizing human beings based upon one or more
intrinsic physical or behavioral traits. It is based on “something you are”. It uses physiological or behavioral characteristics
like facial or fingerprint scans and iris or voice recognition to identify users[4].
C. Knowledge based Authentication
Knowledge based authentication are the most extensively used authentication techniques and include both text
based and picture based passwords KBA is based on “something You Know to identify you”. The major drawback of tokenbased and biometric- based authentication methods are expensive and requires special devices. Graphical- based password
methods have been proposed as a potential alternative to text-based techniques, supported partially by the fact that humans
can remember images better than text Psychologists have confirmed that in both recognition and recall scenarios, the images
are more memorable than text. Therefore, graphical- based authentication mechanisms have higher usability than other
authentication techniques In general, the graphical password methods can be classified into two categories: Recognitionbased[5] and Recall- based graphical techniques [ 6].
D. Click based Graphical Password
Graphical password mechanisms are a type of knowledge-based authentication that attempts to leverage the human
memory for visual information. A precursor to Persuasive cued click points(PCCP) was designed to reduce patterns and to
www.ijmer.com

3005 | Page
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3005-3007
ISSN: 2249-6645
reduce the usefulness of hotspots for attackers. Rather than five click- points on one image, CCP uses one click-point on five
different images shown in the sequence[7].The next image displayed is based on the location of the previously entered cued
click-point (Figure. 1), creating a path through an image set. Users select their images only to the extent that their cued clickpoint determines the next image. Creating a new password with different cued click-points results in a different image
sequence[8].

Figure 1: A user navigates through images to form a CCP password
E. Persuasive Technology
Persuasive Technology is a technology to motivate and influence people to behave in a desired manner. An
authentication method which applies Persuasive Technology should guide and encourage users to select stronger passwords,
but not impose system-generated passwords. To be effective, the users must not ignore the persuasive technology elements
and the resulting passwords must be memorable. As detailed below, PCCP accomplishes this by making the task of selecting
a low level(weak) password more tedious and time consuming [7]. The path of least resistance for users is to select a strong
password (not comprised entirely of known hotspots or following a predictable pattern).The formation of hotspots across
various users is minimized since click-points are more randomly distributed.
III.
PERSUASIVE CUED CLICK POINT MECHANISM
Using a skewed password distribution the hackers can guess the password in the previous graphical password
schemes. Without the system guidance most of the users clicks on the hotspot in each selected image. In this method the
system influence the user to select more random clicks, and also maintains the memorability of the user. In this method when
the image is displayed the randomly selected block called the view port only clearly seen out. All the other parts of the image
are shaded, so that the user can click only inside the view port of the image. This is how the PCCP influence the user to
select the position of the cued click point. The view ports of the image are selected by the system randomly for each image to
create a graphical password. It will be very hard for the hackers to guess the click point in all the images.
The users are allowed to click anywhere in the view port of the image. There is an option for changing the viewport
(Figure 2) position also. This option is called as “Shuffle”. There is a limit on the number of times the shuffle option to be
used by the user. While users may shuffle as often as desired, this significantly slows down the password creation. The
viewport and shuffle button appear only during password creation process. During later password entry, the images are
displayed normally, without shading or the view port, and the users may click anywhere on the images. Like Pass Points and
CCP, login click-points must be within the defined tolerance squares of the original points in the image. The theoretical
password space for a password system is the total number of unique passwords that could be generated according to the
given system specifications.
Ideally, a larger theoretical password space would lowers the likelihood that any particular guess is correct for a
given password. Whereas text passwords have very skewed distributions resulting in an effective password space much
smaller than the theoretical space, therefore PCCP is specifically designed to significantly reduce such skews. The recall
studies of the PCCP approach proved that remembrance of the graphical password methods is much better than the textbased passwords.

Figure 2: PCCP Create Password interface. The viewport highlights part of the image
www.ijmer.com

3006 | Page
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3005-3007
ISSN: 2249-6645
IV.
USABILITY EVALUATION AND SECURITY ANALYSIS
A. Usability of PCCP
PCCP has similar success rates to the other authentication mechanisms evaluated (CCP, PassPoints, and text).
PCCP password entry takes a similar time to the other mechanisms in the initial lab sessions, but the results indicate longer
recall times for PCCP when recalling passwords beyond the initial session. Users who shuffled more had significantly higher
success rates in the PCCP Lab study, but the difference in success rates between high and low shufflers was not statistically
significant for the two week or the web studies. Furthermore, users reported favorable opinions of PCCP in the post-task
questionnaires; a general trend indicates that larger images or more click- points negatively impacts the password entry time.
No clear pattern emerges between the 6 conditions for success rates, providing no evidence that either manipulation affects
success rates in a consistent manner.
B. Security of PCCP
Given that click-point clustering and hotspots are significantly less prominent for PCCP than for CCP and PassPoints, guessing attacks based on these characteristics are less likely to succeed. Taking into account PCCP’s sequence of
images rather than a single image offers further reduction in the efficiency of the guessing attacks. For capture attacks, PCCP
is susceptible to shoulder surfing and malware capturing user input during the password entry. However, we expect social
engineering and phishing to be more difficult than for other cued recall graphical password methods due to PCCP’s multiple
images.
V.
CONCLUSION
Graphical password schemes essentially use images or representation of images as passwords. Human brain is good in
remembering images (pictures) than textual character. There are various graphical password methods or graphical password
software’s are available in the market. Therefore, this paper work merges persuasive cued click points and the password
guessing resistant protocol. The major goal of this work is to reduce the guessing attacks as well as encouraging users to
select more random, and difficult passwords to guess by attackers. Well known security threats like brute force attacks and
the dictionary attacks can be successfully abolished using this method.

REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]

S. Chiasson, A. Forget, E. Stobert, P. van Oorschot, and R. Biddle, “Multiple Password Interference in Text and Click-Based
Graphical Passwords,” Proc. ACM Conf. Computer and Comm. Security (CCS), Nov. 2009.
A. Forget, S. Chiasson, P. van Oorschot, and R. Biddle, “Improving Text Passwords through Persuasion,” Proc. Fourth Symp.
Usable Privacy and Security (SOUPS), July 2008.
Wazir Zada Khan, Mohammed Y. Aalsalem and Yang Xiang ―A Graphical Password Based Systems for Small Mobile Devices,
IJCS Issues, vol 8,Issue 5, No. 2, September 2011.
Neil Yager and Ted Dunstone ―The Biometric Menagerie‖ IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol
32, No. 2 February 2010.
Sadiq Almuairrfi, Prakash Veeraraghavan and Naveen Chilamkurti ―Implicit Password Authentication System ― 2011
Workshops of International Conference on Advanced Information Networking and Applications.
Xiaoyuan Suo Ying Zhu and G. Scott. Owen ―Graphical Passwords : A Survey.
S. Chiasson, A. Forget, R. Biddle, and P. van Oorschot, “Influencing Users towards Better Passwords: Persuasive Cued ClickPoints,” Proc. British HCI Group Ann. Conf. People and Computers: Culture, Creativity, Interaction, Sept. 2008.
X.S. Zhou and T.S. Huang, ― Relevance feedback For Image Retrieval: A Comprehensive Review,Multimedia systems, vol.8, no.
6 Apr. 2003.

www.ijmer.com

3007 | Page

More Related Content

What's hot

A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1Shaibi Varkey
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsHari Krishnan
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationDhvani Shah
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbha nandan
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbhijit Akotkar
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User AuthenticationSarthak Gupta
 
Comprehensive study of the usability features of the Graphical Password
Comprehensive study of the usability features of the  Graphical  Password Comprehensive study of the usability features of the  Graphical  Password
Comprehensive study of the usability features of the Graphical Password taniamutholil
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorNitesh Kumar
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureeSAT Journals
 
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical passwordParag Tamhane
 
Graphical password
Graphical passwordGraphical password
Graphical passwordsowji888
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsLeMeniz Infotech
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Alexander Decker
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMNexgen Technology
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of soundVikram Verma
 

What's hot (20)

A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
 
Comprehensive study of the usability features of the Graphical Password
Comprehensive study of the usability features of the  Graphical  Password Comprehensive study of the usability features of the  Graphical  Password
Comprehensive study of the usability features of the Graphical Password
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical password
 
Sudhanshu Raman
Sudhanshu RamanSudhanshu Raman
Sudhanshu Raman
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...
 
Vshantaram
VshantaramVshantaram
Vshantaram
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of sound
 

Viewers also liked

Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Journey from Six Sigma to Lean Six Sigma: A Literature Review
Journey from Six Sigma to Lean Six Sigma: A Literature ReviewJourney from Six Sigma to Lean Six Sigma: A Literature Review
Journey from Six Sigma to Lean Six Sigma: A Literature ReviewIJMER
 
A043010106
A043010106A043010106
A043010106IJMER
 
A New Method Based On the Comparison of the Unique Chain Code to Detect Isom...
A New Method Based On the Comparison of the Unique Chain  Code to Detect Isom...A New Method Based On the Comparison of the Unique Chain  Code to Detect Isom...
A New Method Based On the Comparison of the Unique Chain Code to Detect Isom...IJMER
 
A Novel Technique for Enhancing Active and Reactive Power Quality for Renewab...
A Novel Technique for Enhancing Active and Reactive Power Quality for Renewab...A Novel Technique for Enhancing Active and Reactive Power Quality for Renewab...
A Novel Technique for Enhancing Active and Reactive Power Quality for Renewab...IJMER
 
Dz3212381244
Dz3212381244Dz3212381244
Dz3212381244IJMER
 
Steady Resource Selection Model for Housing Projects in Nigeria
Steady Resource Selection Model for Housing Projects in NigeriaSteady Resource Selection Model for Housing Projects in Nigeria
Steady Resource Selection Model for Housing Projects in NigeriaIJMER
 
Ak32659666
Ak32659666Ak32659666
Ak32659666IJMER
 
Moving Object Detection for Video Surveillance
Moving Object Detection for Video SurveillanceMoving Object Detection for Video Surveillance
Moving Object Detection for Video SurveillanceIJMER
 
An Approach for Project Scheduling Using PERT/CPM and Petri Nets (PNs) Tools
An Approach for Project Scheduling Using PERT/CPM and Petri Nets (PNs) ToolsAn Approach for Project Scheduling Using PERT/CPM and Petri Nets (PNs) Tools
An Approach for Project Scheduling Using PERT/CPM and Petri Nets (PNs) ToolsIJMER
 
Hydrological Modeling of Upper Indus Basin and Assessment of Deltaic Ecology
Hydrological Modeling of Upper Indus Basin and Assessment of  Deltaic EcologyHydrological Modeling of Upper Indus Basin and Assessment of  Deltaic Ecology
Hydrological Modeling of Upper Indus Basin and Assessment of Deltaic EcologyIJMER
 
A Novel Method for Data Cleaning and User- Session Identification for Web Mining
A Novel Method for Data Cleaning and User- Session Identification for Web MiningA Novel Method for Data Cleaning and User- Session Identification for Web Mining
A Novel Method for Data Cleaning and User- Session Identification for Web MiningIJMER
 
Contact Pressure Validation of Steam Turbine Casing for Static Loading Condition
Contact Pressure Validation of Steam Turbine Casing for Static Loading ConditionContact Pressure Validation of Steam Turbine Casing for Static Loading Condition
Contact Pressure Validation of Steam Turbine Casing for Static Loading ConditionIJMER
 
Study of Flexible Lift Mechanism for Press Shop
Study of Flexible Lift Mechanism for Press ShopStudy of Flexible Lift Mechanism for Press Shop
Study of Flexible Lift Mechanism for Press ShopIJMER
 
FPGA Based Power Efficient Chanalizer For Software Defined Radio
FPGA Based Power Efficient Chanalizer For Software Defined RadioFPGA Based Power Efficient Chanalizer For Software Defined Radio
FPGA Based Power Efficient Chanalizer For Software Defined RadioIJMER
 
Ea3212451252
Ea3212451252Ea3212451252
Ea3212451252IJMER
 
Au32721724
Au32721724Au32721724
Au32721724IJMER
 
Cn31386390
Cn31386390Cn31386390
Cn31386390IJMER
 
Regression techniques to study the student performance in post graduate exam...
Regression techniques to study the student performance in post  graduate exam...Regression techniques to study the student performance in post  graduate exam...
Regression techniques to study the student performance in post graduate exam...IJMER
 

Viewers also liked (20)

Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
Journey from Six Sigma to Lean Six Sigma: A Literature Review
Journey from Six Sigma to Lean Six Sigma: A Literature ReviewJourney from Six Sigma to Lean Six Sigma: A Literature Review
Journey from Six Sigma to Lean Six Sigma: A Literature Review
 
A043010106
A043010106A043010106
A043010106
 
A New Method Based On the Comparison of the Unique Chain Code to Detect Isom...
A New Method Based On the Comparison of the Unique Chain  Code to Detect Isom...A New Method Based On the Comparison of the Unique Chain  Code to Detect Isom...
A New Method Based On the Comparison of the Unique Chain Code to Detect Isom...
 
A Novel Technique for Enhancing Active and Reactive Power Quality for Renewab...
A Novel Technique for Enhancing Active and Reactive Power Quality for Renewab...A Novel Technique for Enhancing Active and Reactive Power Quality for Renewab...
A Novel Technique for Enhancing Active and Reactive Power Quality for Renewab...
 
Dz3212381244
Dz3212381244Dz3212381244
Dz3212381244
 
Steady Resource Selection Model for Housing Projects in Nigeria
Steady Resource Selection Model for Housing Projects in NigeriaSteady Resource Selection Model for Housing Projects in Nigeria
Steady Resource Selection Model for Housing Projects in Nigeria
 
Ak32659666
Ak32659666Ak32659666
Ak32659666
 
Moving Object Detection for Video Surveillance
Moving Object Detection for Video SurveillanceMoving Object Detection for Video Surveillance
Moving Object Detection for Video Surveillance
 
An Approach for Project Scheduling Using PERT/CPM and Petri Nets (PNs) Tools
An Approach for Project Scheduling Using PERT/CPM and Petri Nets (PNs) ToolsAn Approach for Project Scheduling Using PERT/CPM and Petri Nets (PNs) Tools
An Approach for Project Scheduling Using PERT/CPM and Petri Nets (PNs) Tools
 
Hydrological Modeling of Upper Indus Basin and Assessment of Deltaic Ecology
Hydrological Modeling of Upper Indus Basin and Assessment of  Deltaic EcologyHydrological Modeling of Upper Indus Basin and Assessment of  Deltaic Ecology
Hydrological Modeling of Upper Indus Basin and Assessment of Deltaic Ecology
 
A Novel Method for Data Cleaning and User- Session Identification for Web Mining
A Novel Method for Data Cleaning and User- Session Identification for Web MiningA Novel Method for Data Cleaning and User- Session Identification for Web Mining
A Novel Method for Data Cleaning and User- Session Identification for Web Mining
 
Contact Pressure Validation of Steam Turbine Casing for Static Loading Condition
Contact Pressure Validation of Steam Turbine Casing for Static Loading ConditionContact Pressure Validation of Steam Turbine Casing for Static Loading Condition
Contact Pressure Validation of Steam Turbine Casing for Static Loading Condition
 
Study of Flexible Lift Mechanism for Press Shop
Study of Flexible Lift Mechanism for Press ShopStudy of Flexible Lift Mechanism for Press Shop
Study of Flexible Lift Mechanism for Press Shop
 
FPGA Based Power Efficient Chanalizer For Software Defined Radio
FPGA Based Power Efficient Chanalizer For Software Defined RadioFPGA Based Power Efficient Chanalizer For Software Defined Radio
FPGA Based Power Efficient Chanalizer For Software Defined Radio
 
Ea3212451252
Ea3212451252Ea3212451252
Ea3212451252
 
Au32721724
Au32721724Au32721724
Au32721724
 
Cn31386390
Cn31386390Cn31386390
Cn31386390
 
Regression techniques to study the student performance in post graduate exam...
Regression techniques to study the student performance in post  graduate exam...Regression techniques to study the student performance in post  graduate exam...
Regression techniques to study the student performance in post graduate exam...
 

Similar to A Graphical Password Scheme using Persuasive Cued Click Points

Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...IOSR Journals
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...IOSR Journals
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityijsptm
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationeSAT Publishing House
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...IOSR Journals
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishnabanda5630
 
Research ppr
Research pprResearch ppr
Research pprSara Sahu
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationIRJET Journal
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationIRJET Journal
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...IOSR Journals
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
 
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesIJNSA Journal
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONcscpconf
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password schemeIAEME Publication
 
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordTwo Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordIOSR Journals
 
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System             IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System IRJET Journal
 

Similar to A Graphical Password Scheme using Persuasive Cued Click Points (20)

Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTPPersuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and security
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
 
Research ppr
Research pprResearch ppr
Research ppr
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
 
An03402300234
An03402300234An03402300234
An03402300234
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
 
Ce36484489
Ce36484489Ce36484489
Ce36484489
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordTwo Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical Password
 
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System             IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Recently uploaded

Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

A Graphical Password Scheme using Persuasive Cued Click Points

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3005-3007 ISSN: 2249-6645 A Graphical Password Scheme using Persuasive Cued Click Points Moulisai Rachagundla1, Syed Gulam Gouse2 1 M.Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India. Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India. 2 ABSTRACT: Despite the ubiquity of password systems, knowledge-based authentication mechanism remains an important and active research area. Many current systems have low level security, and even then users often devise insecure coping strategies in order to compensate for memorability and usability problems. Alternatives such as tokens or biometrics raise other issues such as privacy and loss. Various graphical password mechanisms have received considerable attention in response. A systematic review of the literature on graphical passwords shows no consistency in the usability and security evaluation of various schemes. The situation is similar for text passwords, making fair comparison between methods nearly impossible. This paper presents a graphical password scheme using persuasive cued click points. This method is based on knowledge based authentication. Keywords: Authentication, Cued click points, Graphical password, Persuasive technology. I. INTRODUCTION To validate the end user for authentication, we usually prefer to adopt the knowledge-based authentication mechanism, which involves text based passwords. The text based passwords [1] are vulnerable to be hacked. The hackers can easily guess the text passwords with other details of the system. If we want to avoid this, the system can assign a strong password, which the hacker cannot guess. But the system assigned passwords are very difficult to memorize and also remembered by the user. The study on the graphical password mechanisms states that the click point passwords are hard to guess by the attacker and easy to remember for the users. So the password authentication system should encourage the strong password selection scheme while maintaining the memorability of the user. This paper proposes the idea of persuasive technology [2] cued click point authentication with dynamic user blocks. This mechanism influence the user to set a random password which cannot be guessed and also being graphical, the user can easily remember. In practical situations the same user will require different level of security for different types of applications over the internet. But the existing system provides a concrete security level, which is same for all users and the applications. It sets the threshold value as a fixed one whose size cannot be changed. In the proposed system the size of the threshold value is set by the user, depending upon his/her current requirement, with the help of dynamic user blocks. To increase the memorability of the user, audio support can also be provided, i.e. each click point is randomly associated with an audio sound clip. So that legitimate user can be alarmed for wrong clicks. II. LITERATURE SURVEY A. Token based Methods The traditional user name /password or personal identification number (PIN) based authentication scheme is an example of the Token Based. It is based on “something You possess”. For example, Smart Cards, a driver's license, credit card, a university ID card etc. It allows users to enter their user name/ password in order to obtain a token which allows them to fetch a specific resource- without using their user name and password. Once their token has been obtained, then the user can offer the token-which offers access to a specific resource for a time period- to the remote site[3]. B. Biometrics Biometrics is the study of automated methods for uniquely recognizing human beings based upon one or more intrinsic physical or behavioral traits. It is based on “something you are”. It uses physiological or behavioral characteristics like facial or fingerprint scans and iris or voice recognition to identify users[4]. C. Knowledge based Authentication Knowledge based authentication are the most extensively used authentication techniques and include both text based and picture based passwords KBA is based on “something You Know to identify you”. The major drawback of tokenbased and biometric- based authentication methods are expensive and requires special devices. Graphical- based password methods have been proposed as a potential alternative to text-based techniques, supported partially by the fact that humans can remember images better than text Psychologists have confirmed that in both recognition and recall scenarios, the images are more memorable than text. Therefore, graphical- based authentication mechanisms have higher usability than other authentication techniques In general, the graphical password methods can be classified into two categories: Recognitionbased[5] and Recall- based graphical techniques [ 6]. D. Click based Graphical Password Graphical password mechanisms are a type of knowledge-based authentication that attempts to leverage the human memory for visual information. A precursor to Persuasive cued click points(PCCP) was designed to reduce patterns and to www.ijmer.com 3005 | Page
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3005-3007 ISSN: 2249-6645 reduce the usefulness of hotspots for attackers. Rather than five click- points on one image, CCP uses one click-point on five different images shown in the sequence[7].The next image displayed is based on the location of the previously entered cued click-point (Figure. 1), creating a path through an image set. Users select their images only to the extent that their cued clickpoint determines the next image. Creating a new password with different cued click-points results in a different image sequence[8]. Figure 1: A user navigates through images to form a CCP password E. Persuasive Technology Persuasive Technology is a technology to motivate and influence people to behave in a desired manner. An authentication method which applies Persuasive Technology should guide and encourage users to select stronger passwords, but not impose system-generated passwords. To be effective, the users must not ignore the persuasive technology elements and the resulting passwords must be memorable. As detailed below, PCCP accomplishes this by making the task of selecting a low level(weak) password more tedious and time consuming [7]. The path of least resistance for users is to select a strong password (not comprised entirely of known hotspots or following a predictable pattern).The formation of hotspots across various users is minimized since click-points are more randomly distributed. III. PERSUASIVE CUED CLICK POINT MECHANISM Using a skewed password distribution the hackers can guess the password in the previous graphical password schemes. Without the system guidance most of the users clicks on the hotspot in each selected image. In this method the system influence the user to select more random clicks, and also maintains the memorability of the user. In this method when the image is displayed the randomly selected block called the view port only clearly seen out. All the other parts of the image are shaded, so that the user can click only inside the view port of the image. This is how the PCCP influence the user to select the position of the cued click point. The view ports of the image are selected by the system randomly for each image to create a graphical password. It will be very hard for the hackers to guess the click point in all the images. The users are allowed to click anywhere in the view port of the image. There is an option for changing the viewport (Figure 2) position also. This option is called as “Shuffle”. There is a limit on the number of times the shuffle option to be used by the user. While users may shuffle as often as desired, this significantly slows down the password creation. The viewport and shuffle button appear only during password creation process. During later password entry, the images are displayed normally, without shading or the view port, and the users may click anywhere on the images. Like Pass Points and CCP, login click-points must be within the defined tolerance squares of the original points in the image. The theoretical password space for a password system is the total number of unique passwords that could be generated according to the given system specifications. Ideally, a larger theoretical password space would lowers the likelihood that any particular guess is correct for a given password. Whereas text passwords have very skewed distributions resulting in an effective password space much smaller than the theoretical space, therefore PCCP is specifically designed to significantly reduce such skews. The recall studies of the PCCP approach proved that remembrance of the graphical password methods is much better than the textbased passwords. Figure 2: PCCP Create Password interface. The viewport highlights part of the image www.ijmer.com 3006 | Page
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3005-3007 ISSN: 2249-6645 IV. USABILITY EVALUATION AND SECURITY ANALYSIS A. Usability of PCCP PCCP has similar success rates to the other authentication mechanisms evaluated (CCP, PassPoints, and text). PCCP password entry takes a similar time to the other mechanisms in the initial lab sessions, but the results indicate longer recall times for PCCP when recalling passwords beyond the initial session. Users who shuffled more had significantly higher success rates in the PCCP Lab study, but the difference in success rates between high and low shufflers was not statistically significant for the two week or the web studies. Furthermore, users reported favorable opinions of PCCP in the post-task questionnaires; a general trend indicates that larger images or more click- points negatively impacts the password entry time. No clear pattern emerges between the 6 conditions for success rates, providing no evidence that either manipulation affects success rates in a consistent manner. B. Security of PCCP Given that click-point clustering and hotspots are significantly less prominent for PCCP than for CCP and PassPoints, guessing attacks based on these characteristics are less likely to succeed. Taking into account PCCP’s sequence of images rather than a single image offers further reduction in the efficiency of the guessing attacks. For capture attacks, PCCP is susceptible to shoulder surfing and malware capturing user input during the password entry. However, we expect social engineering and phishing to be more difficult than for other cued recall graphical password methods due to PCCP’s multiple images. V. CONCLUSION Graphical password schemes essentially use images or representation of images as passwords. Human brain is good in remembering images (pictures) than textual character. There are various graphical password methods or graphical password software’s are available in the market. Therefore, this paper work merges persuasive cued click points and the password guessing resistant protocol. The major goal of this work is to reduce the guessing attacks as well as encouraging users to select more random, and difficult passwords to guess by attackers. Well known security threats like brute force attacks and the dictionary attacks can be successfully abolished using this method. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] S. Chiasson, A. Forget, E. Stobert, P. van Oorschot, and R. Biddle, “Multiple Password Interference in Text and Click-Based Graphical Passwords,” Proc. ACM Conf. Computer and Comm. Security (CCS), Nov. 2009. A. Forget, S. Chiasson, P. van Oorschot, and R. Biddle, “Improving Text Passwords through Persuasion,” Proc. Fourth Symp. Usable Privacy and Security (SOUPS), July 2008. Wazir Zada Khan, Mohammed Y. Aalsalem and Yang Xiang ―A Graphical Password Based Systems for Small Mobile Devices, IJCS Issues, vol 8,Issue 5, No. 2, September 2011. Neil Yager and Ted Dunstone ―The Biometric Menagerie‖ IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol 32, No. 2 February 2010. Sadiq Almuairrfi, Prakash Veeraraghavan and Naveen Chilamkurti ―Implicit Password Authentication System ― 2011 Workshops of International Conference on Advanced Information Networking and Applications. Xiaoyuan Suo Ying Zhu and G. Scott. Owen ―Graphical Passwords : A Survey. S. Chiasson, A. Forget, R. Biddle, and P. van Oorschot, “Influencing Users towards Better Passwords: Persuasive Cued ClickPoints,” Proc. British HCI Group Ann. Conf. People and Computers: Culture, Creativity, Interaction, Sept. 2008. X.S. Zhou and T.S. Huang, ― Relevance feedback For Image Retrieval: A Comprehensive Review,Multimedia systems, vol.8, no. 6 Apr. 2003. www.ijmer.com 3007 | Page