Submit Search
Upload
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Shoulder Surfing attacks”
•
0 likes
•
56 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i1/IRJET-V4I174.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
Generic Authentication System
Generic Authentication System
IRJET Journal
Image authentication for secure login
Image authentication for secure login
IRJET Journal
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
IJCST - ESRG Journals
Engineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
banda5630
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
eSAT Publishing House
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
IRJET Journal
IRJET- Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
IRJET Journal
Shoulder surfing resistant graphical
Shoulder surfing resistant graphical
Kamal Spring
Recommended
Generic Authentication System
Generic Authentication System
IRJET Journal
Image authentication for secure login
Image authentication for secure login
IRJET Journal
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
IJCST - ESRG Journals
Engineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
banda5630
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
eSAT Publishing House
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
IRJET Journal
IRJET- Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
IRJET Journal
Shoulder surfing resistant graphical
Shoulder surfing resistant graphical
Kamal Spring
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
IRJET Journal
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET Journal
J0704055058
J0704055058
IJERD Editor
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET Journal
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key Order
IRJET Journal
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
IRJET Journal
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
IJMER
Ijsrdv8 i10355
Ijsrdv8 i10355
aissmsblogs
Design and Implementation of Enhanced Single Sign on System for Education Sys...
Design and Implementation of Enhanced Single Sign on System for Education Sys...
IRJET Journal
Automated Detection of Session Fixation Vulnerabilities
Automated Detection of Session Fixation Vulnerabilities
Yuji Kosuga
Op2423922398
Op2423922398
IJERA Editor
Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
IRJET Journal
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
IJNSA Journal
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
Yuji Kosuga
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
IOSR Journals
Image-Based Authentication from Confident Technologies
Image-Based Authentication from Confident Technologies
Confident Technologies
Android Based Total Security for System Authentication
Android Based Total Security for System Authentication
IJERA Editor
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
Syed Ubaid Ali Jafri
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
IAEME Publication
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
Yuji Kosuga
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
More Related Content
What's hot
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
IRJET Journal
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET Journal
J0704055058
J0704055058
IJERD Editor
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET Journal
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key Order
IRJET Journal
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
IRJET Journal
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
IJMER
Ijsrdv8 i10355
Ijsrdv8 i10355
aissmsblogs
Design and Implementation of Enhanced Single Sign on System for Education Sys...
Design and Implementation of Enhanced Single Sign on System for Education Sys...
IRJET Journal
Automated Detection of Session Fixation Vulnerabilities
Automated Detection of Session Fixation Vulnerabilities
Yuji Kosuga
Op2423922398
Op2423922398
IJERA Editor
Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
IRJET Journal
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
IJNSA Journal
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
Yuji Kosuga
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
IOSR Journals
Image-Based Authentication from Confident Technologies
Image-Based Authentication from Confident Technologies
Confident Technologies
Android Based Total Security for System Authentication
Android Based Total Security for System Authentication
IJERA Editor
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
Syed Ubaid Ali Jafri
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
IAEME Publication
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
Yuji Kosuga
What's hot
(20)
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
J0704055058
J0704055058
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key Order
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
Ijsrdv8 i10355
Ijsrdv8 i10355
Design and Implementation of Enhanced Single Sign on System for Education Sys...
Design and Implementation of Enhanced Single Sign on System for Education Sys...
Automated Detection of Session Fixation Vulnerabilities
Automated Detection of Session Fixation Vulnerabilities
Op2423922398
Op2423922398
Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
Image-Based Authentication from Confident Technologies
Image-Based Authentication from Confident Technologies
Android Based Total Security for System Authentication
Android Based Total Security for System Authentication
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
Similar to A Survey on “Pass sequence acting as OTP using Login Indicator preventing Shoulder Surfing attacks”
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET Journal
Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical Captcha
Sankar Anand
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
IRJET Journal
Graphical Password Authentication
Graphical Password Authentication
IRJET Journal
A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice Recognition
IRJET Journal
Enhanced Security Through Token
Enhanced Security Through Token
IRJET Journal
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
IRJET Journal
otp crid cards
otp crid cards
Bayalagmaa Davaanyam
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET Journal
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET Journal
Multilevel Security and Authentication System
Multilevel Security and Authentication System
paperpublications3
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
IRJET Journal
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
IRJET Journal
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
cscpconf
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
LeMeniz Infotech
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
IJCSIS Research Publications
SQl Injection Protector for Authentication in Distributed Applications
SQl Injection Protector for Authentication in Distributed Applications
IOSR Journals
Similar to A Survey on “Pass sequence acting as OTP using Login Indicator preventing Shoulder Surfing attacks”
(20)
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical Captcha
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
Graphical Password Authentication
Graphical Password Authentication
A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice Recognition
Enhanced Security Through Token
Enhanced Security Through Token
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
otp crid cards
otp crid cards
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
Multilevel Security and Authentication System
Multilevel Security and Authentication System
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
SQl Injection Protector for Authentication in Distributed Applications
SQl Injection Protector for Authentication in Distributed Applications
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Recently uploaded
(20)
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Shoulder Surfing attacks”
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 459 A Survey on “Pass sequence acting as OTP using Login Indicator preventing Shoulder Surfing attacks” Amit Kalamkar, Sweta Chaugule, Swati Lavate, Dinesh Dalvi Student Computer Department, SKN SITS Lonavala, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Shoulder-Surfing is a recognized hazard where an attacker can capture a password by means of direct observation or by way of recording the authentication. There were some graphical schemes resistant to SSAs; however they have got substantial usabilitydrawbacks, generallyinthetime and effort to log in. In this paper, we suggest and compare a brand new shoulder-browsing resistant scheme which has a proper usability for PDAs.The new scheme requires users to attract throughout their password pix orderly inpreferenceto click directly on them. Authentication based on passwords is used in large part of programs for laptop securityandprivacy. However, human efforts consisting of choosing badpasswords and inputting passwords in an insecure manner are regarded as the weakest link in authentication chain. While choosing alphanumeric strings, customerstendtoselectpasswordsboth quick and significant for easy memorization. This evolution brings superb comfort however also increasestheopportunity of disclosing passwords to SSAs. Attackers can take a look directly or use outside recording gadgets to acquire users credentials. To conquer this hassle, we proposed a novel authentication device Pass Matrix, based totally on graphical passwords to resist SSAs assaults. With a one-time login indicator the pass sequence generated each time is different which offers no trace for attackerstodetermine thepassword. We additionally applied a Pass Matrix prototype on Android and carried out actual user experiments. From the experimental end result, the proposed system achieves higher resistance to Shoulder browsing attacks even as retaining usability. Key Words: Pass images, Pass value, Login Indicator, Shoulder Surfing Attacks (SSAs) and Authentication 1. INTRODUCTION Nowadays with the rapid and unstoppable growth in the development field of technology has created the scope of becoming the use to of it. Where the authentication plays a vital role for ensuring the users identity. And for ensuring the identity username and password must be verified. But the most importantly the attention is given to the password which must be hide from the world to protect ones repository. Till now we used the textual passwords for the authentication purpose which may be comprised of lower case letters, upper case letters or the alphanumeric combinationsofoneanother.Somehowthetextual password is considered strong enough for resisting against the brute force approach. Sometimes the long and complicated textual passwords become hard to memorize and collect. However by selecting the simple textual passwords may increasesitsvulnerability for attacks or intrusions. One of the most commonly and easily happened attack is the Shoulder surfing attacks (SSAs). SSAs are the attacks which can be happened at any point of time just by looking over someone’s shoulder while entering the passwords. It may happen by direct observing or by using video capturing technique to get passwords, PINs or other sensitive personal information. In the whole authentication process the human action such as choosing the bad and weak password for a new account and putting the passwords in an insecure way for later logins is considered as the weakest link in the authentication chain. To overcome all these drawbacks an alternative is available for setting the password as Graphical images in a place of textual passwords. Graphical passwords have the tendency to bridge the gap of inputting the password and getting attacked. As memorizing the images, for a long time with Long Term Memory (LTM) is easier then verbal representation. They also create a scope of vulnerable to SSAs but the extent of getting attacked is reduced by various means. In this paper we present a novel and secure Graphical Authentication System which providesanadvancedsecurity to the passwords with combination of Pass images selected
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 460 from the collection of images or from our local data storage. Security is provided by on click method on pass images which generates the pass value for the corresponding click and results in generation of pass sequence. Every time the pass sequence is generated by the Login Indicator in the background for single login session which acts as OTP i.e. one time password which is sent to the user’s mail id .Prevention from the SSAs is provided bygeneratingthePass sequence for every login sessionandwhichgetsuselessafter termination of that session. 2. Related Work Both are not immune as expected to SSAs and other brute force attacks More advancement in the security is provided with the Graphical images in the way of generating the pass sequence every time. So various aspects in graphical passwords are as follows: 2.1: Pass Value System The images selected from the collection of images are divided into pass squares having associated pass value for each pass square. On clicking, the corresponding pass value or pixel value is traced and recorded. For every image the pass values are generated on clicking on each image all the time and the sequence formed by the pass values is only resides till termination of that session. 2.2: Pass Matrix Algorithm The algorithm used is Pass Matrix which divides each pass image into a grid of matrix of 7 X 11 form having the horizontal and vertical bar values. Those values are randomly generated by the login indicator in each login session which corresponds to different different passvalues for the click. Fig: (a) The primary page of bypass Matrix, consumer can check in an account practice or start to login for experiment. (b) Users can pick from a listing of 24 pictures as their Pass images. (c) From the 7X11 squares in each photo, the users pick one as the pass square on clicking 2.3: OTP generation/Pass Sequence Here the OTP which is nothing but the sequence generated by the login indicator in bag ground which is sent to the user’s mail ID.After validating and verificationthatsequence the user are allowed to authenticate. 3. Proposed System The system which we are proposing is more prone to SSAs attacks and increases the level of security.Gaphical images are provided with advancements on the basis of ON CLICK method instead of following the patterns on the images which are used earlier. The whole system works in two phases 1. Registration phase: creating a username and password using the images for the very first time 2. Authentication Phase: authorized users then uses the One time randomly generated sequence to login
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 461 3.1. System Architecture 4. Motivation In 2006, Wiedenbeck et al. proposed Pass Points in which the user picks up several points (3 to 5) in an image during the password creation phase andre-enters eachofthese pre- selected click-points in a correct order within its tolerant square during the login phase. Comparingto traditional PIN and textual passwords, the Pass-Pointsschemesubstantially increases the password space and enhances password memorizability.Unfortunately,thisgraphical au-thentication scheme is vulnerable to shoulder surfing attacks. Hence, based on the Pass Points, we add the idea of using one-time session passwords and distracters to develop our Pass Matrix authentication system that is resistant to shoulder surfing attacks. 5. Acknowledgement We would like to express our gratitude towards the guide of our project Mrs. Bhavna Bahikar and all my group partners and the anonymous references who contributed to improve our paper in some way. 6. Conclusion With the growing fashion of internet offerings and apps, users are able to get right of entry to thosepackagesanytime and everywhere with various devices and with a view to guard customers’ digital property, authentication is needed on every occasion they are attempting to get rightofentry to their non-public account and statistics. However, undertaking the authentication method in public would possibly bring about potential shoulder browsing attacks. Even a complicated password can be cracked without difficulty thru shoulder surfing. using traditional textual passwords or PIN technique, users need to type their passwords to authenticate themselves andasa consequence those passwords may be discovered without difficulty if a person peeks over shoulder or uses video recording devices which include cellular telephones. Outgrowing and overcoming the issues related to security and to have a safe data storage and transfer we have proposed a system where the Pass sequence actingasOTPpreventingShoulder Surfing attacks’ replaces the textual passwords in this manner. Using this approach of passwords will greatly increases the level of security and reduces the extent of various brute force and SSAs attacks. REFERENCES [1] Hung-Min Sun,Shiunan-Tung Chen,Jyh-Haw Yeh and Chia-Yun Cheng, A Shoulder Surfing Resistant Graphical Authentication System,Citation Information DOI 10.1109/TDSC.2016.2539942,IEEE. [2] Roshni Rajavat, Bhavna Gala,Asmita Redekar, Textual and Graphical password Authentication scheme Resistant to Shoulder Surfing, 2015. International Journal of Computer Applications(0975-8887). Proceeding of International Conference on, 19,march 2015. [3] 1.S. Sood, A. Sarje, and K. Singh, Cryptanalysis of password authentication schemes: Current status and key issues, in Methods and Models in Computer Science, 2009. ICM2CS 2009. Proceeding of International Conference on, Dec 2009, pp. 17. [4] S. Sood, A. Sarje, and K. Singh, “Cryptanalysis of password authentication schemes: Current status and key issues,” in Methods and Models in Computer Science, 2009.ICM2CS2009. ProceedingofInternational Conference on, Dec 2009, pp. 1–7. [5] S. Gurav, L. Gawade, P. Rane, and N. Khochare, “Graphical password authentication: Cloud securing scheme,” in Electronic Systems, Signal Processing and Computing Technologies (ICESC), 2014 International Conference on, Jan 2014, pp. 479–483. [6] S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, “Passpoints: Design andlongitudinal evaluation of a graphical password system,” International Journal of Human-Computer Studies, vol. 63, no. 1-2, pp. 102– 127, 2005.
Download now