Submit Search
Upload
Color based android shuffling pattern lock
•
0 likes
•
55 views
IRJET Journal
Follow
https://irjet.net/archives/V3/i2/IRJET-V3I2166.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
IRJET- Graphical Password to Avoid Shoulder Surfing
IRJET- Graphical Password to Avoid Shoulder Surfing
IRJET Journal
WLAN Penetration Examination of The University of Pembangunan Panca Budi
WLAN Penetration Examination of The University of Pembangunan Panca Budi
Universitas Pembangunan Panca Budi
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
eSAT Publishing House
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
Editor IJCATR
An exploration of geographic authentication scheme
An exploration of geographic authentication scheme
LeMeniz Infotech
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
IAEME Publication
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniques
eSAT Journals
Recommended
IRJET- Graphical Password to Avoid Shoulder Surfing
IRJET- Graphical Password to Avoid Shoulder Surfing
IRJET Journal
WLAN Penetration Examination of The University of Pembangunan Panca Budi
WLAN Penetration Examination of The University of Pembangunan Panca Budi
Universitas Pembangunan Panca Budi
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
eSAT Publishing House
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
Editor IJCATR
An exploration of geographic authentication scheme
An exploration of geographic authentication scheme
LeMeniz Infotech
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
IAEME Publication
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniques
eSAT Journals
Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniques
eSAT Publishing House
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
IJTET Journal
Iciea08
Iciea08
Hanaa Salman
Securing Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint Authentication
Apurva Kini
Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...
Vineet Garg
Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT
IJECEIAES
Mobile Security Using Android: Locate Your Droid
Mobile Security Using Android: Locate Your Droid
IJERA Editor
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET Journal
IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?
IRJET Journal
Cover
Cover
Helmita putri
Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...
TELKOMNIKA JOURNAL
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
Dr. Amarjeet Singh
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
acijjournal
IoT based facial recognition door access control home security system using r...
IoT based facial recognition door access control home security system using r...
International Journal of Power Electronics and Drive Systems
38 9145 it nfc secured offline password storage (edit lafi)
38 9145 it nfc secured offline password storage (edit lafi)
IAESIJEECS
Provide security about risk score in mobile application’s
Provide security about risk score in mobile application’s
eSAT Journals
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
eSAT Publishing House
Internet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
ijtsrd
Security based home surveillance system using android application
Security based home surveillance system using android application
eSAT Publishing House
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMS
Editor IJCATR
A Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical Password
ijtsrd
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET Journal
More Related Content
What's hot
Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniques
eSAT Publishing House
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
IJTET Journal
Iciea08
Iciea08
Hanaa Salman
Securing Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint Authentication
Apurva Kini
Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...
Vineet Garg
Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT
IJECEIAES
Mobile Security Using Android: Locate Your Droid
Mobile Security Using Android: Locate Your Droid
IJERA Editor
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET Journal
IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?
IRJET Journal
Cover
Cover
Helmita putri
Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...
TELKOMNIKA JOURNAL
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
Dr. Amarjeet Singh
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
acijjournal
IoT based facial recognition door access control home security system using r...
IoT based facial recognition door access control home security system using r...
International Journal of Power Electronics and Drive Systems
38 9145 it nfc secured offline password storage (edit lafi)
38 9145 it nfc secured offline password storage (edit lafi)
IAESIJEECS
Provide security about risk score in mobile application’s
Provide security about risk score in mobile application’s
eSAT Journals
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
eSAT Publishing House
Internet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
ijtsrd
Security based home surveillance system using android application
Security based home surveillance system using android application
eSAT Publishing House
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMS
Editor IJCATR
What's hot
(20)
Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniques
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
Iciea08
Iciea08
Securing Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint Authentication
Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...
Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT
Mobile Security Using Android: Locate Your Droid
Mobile Security Using Android: Locate Your Droid
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?
Cover
Cover
Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
IoT based facial recognition door access control home security system using r...
IoT based facial recognition door access control home security system using r...
38 9145 it nfc secured offline password storage (edit lafi)
38 9145 it nfc secured offline password storage (edit lafi)
Provide security about risk score in mobile application’s
Provide security about risk score in mobile application’s
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
Internet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
Security based home surveillance system using android application
Security based home surveillance system using android application
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMS
Similar to Color based android shuffling pattern lock
A Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical Password
ijtsrd
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET Journal
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
ADEIJ Journal
Securezy - A Penetration Testing Toolbox
Securezy - A Penetration Testing Toolbox
IRJET Journal
A Survey of User Authentication Schemes for Mobile Device
A Survey of User Authentication Schemes for Mobile Device
IJMER
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
IJCSIS Research Publications
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET Journal
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
IRJET- Security from Threats of Computer System
IRJET- Security from Threats of Computer System
IRJET Journal
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
IRJET Journal
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET Journal
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
IRJET Journal
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost Mobile
IRJET Journal
Graphical Password by Watermarking for security
Graphical Password by Watermarking for security
IJERA Editor
Contents
Contents
ElmerPineda9
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION
IRJET Journal
Intellectual Bank Locker Security System
Intellectual Bank Locker Security System
IJERA Editor
Intellectual Bank Locker Security System
Intellectual Bank Locker Security System
IJERA Editor
IRJET- Biometric Vehicle Starter and Security
IRJET- Biometric Vehicle Starter and Security
IRJET Journal
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder Lock
IRJET Journal
Similar to Color based android shuffling pattern lock
(20)
A Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical Password
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke Dynamics
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
Securezy - A Penetration Testing Toolbox
Securezy - A Penetration Testing Toolbox
A Survey of User Authentication Schemes for Mobile Device
A Survey of User Authentication Schemes for Mobile Device
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Security from Threats of Computer System
IRJET- Security from Threats of Computer System
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost Mobile
Graphical Password by Watermarking for security
Graphical Password by Watermarking for security
Contents
Contents
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION
Intellectual Bank Locker Security System
Intellectual Bank Locker Security System
Intellectual Bank Locker Security System
Intellectual Bank Locker Security System
IRJET- Biometric Vehicle Starter and Security
IRJET- Biometric Vehicle Starter and Security
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder Lock
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
Signal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
National Chung Hsing University
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
hublikarsn
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
ssuserdfc773
Computer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
ChandrakantDivate1
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
KOUSTAV SARKAR
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
AshwiniTodkar4
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
Amil baba
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
drmkjayanthikannan
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
Ramkumar k
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
meharikiros2
Introduction to Geographic Information Systems
Introduction to Geographic Information Systems
Ange Felix NSANZIYERA
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
SCMS School of Architecture
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
sumitt6_25730773
Online food ordering system project report.pdf
Online food ordering system project report.pdf
Kamal Acharya
Max. shear stress theory-Maximum Shear Stress Theory Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory Maximum Distortional ...
ronahami
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
vanyagupta248
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
kalpana413121
School management system project Report.pdf
School management system project Report.pdf
Kamal Acharya
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
subhasishdas79
Recently uploaded
(20)
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Signal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Computer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
Introduction to Geographic Information Systems
Introduction to Geographic Information Systems
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
Online food ordering system project report.pdf
Online food ordering system project report.pdf
Max. shear stress theory-Maximum Shear Stress Theory Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory Maximum Distortional ...
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
School management system project Report.pdf
School management system project Report.pdf
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
Color based android shuffling pattern lock
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 948 Color based android shuffling pattern lock Adarsh Singh1, Ankit M. Dighraskar 2, Krutika R. Fulkar3, Megha B. Murkute4, Nikunj A. Prajapati5, Mr. S.B. Lanjewar6 12345UG Student, B.E., Computer Science and Engineering, DBACER, Nagpur, Maharashtra, India 6Assistant Professor, Computer Science and Engineering, DBACER, Nagpur, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - To increase convenience and portability, the devices used for IT serviceshavechangedfrombigimmovablemachines to mobile devices such as smartphones and tablets. Due to increased use of smartphones for every purpose including storing important personal data, they require a better security. Belonging to the twenty first century, the era of data security where new security schemes are being developed by scientists and engineers every day. Currently we are using pin lock, alphanumeric lock, pattern lock and some other locking applications. These days when talking about data security the applications currently being used somewhere lag to fulfill the requirement to some extents. This idea introduces a new innovation in the field of data security that is an application with improved features such as locking with the help of some colors arranged in the circular pattern and shuffling every time when applied. The applications which use number based authentication scheme or a fixed point based android like pattern scheme arepronetotheshouldersurfingattacks, which is a type of password guessing using social engineering as a hacking tool." [2] Key Words: Android, Security, Shuffling, Smartphone, Authentication, Pattern Lock. 1.INTRODUCTION These days we can find many cases of data stealing by the attackers for making their own profit by using the hacked (stolen) data. When talking about different types of attacks on personal data of users and precautions against them, there are many possible ways for both. Manually input passwords are the most commonly used security schemes in daily use applications. It has been scientifically proven that human brain chooses a psychologically weak password, as theyfaceproblemremembering strong ones, which can easily be guessed by shoulder surfers. Then came the pattern scheme in existence which is the most used security scheme till the date for security in mobile devices. Also the bio-metrics are being used on a large scale level such as banks, defense etc. but when it comes to personal use, it cannot be preferred due to its very high cost. Apps related to networking services (i.e. chatting, social-networking, e-mailing, net-banking etc.) are more prone to attacks as they contain more important information. In this we propose an upgraded(innovative)idea related toandroidapplockingwiththehelpof 6 color block pattern arranged in circular user interface. The color sequence of the pattern gets shuffled every time when the locked application is given an attempt to open. 2. RELATED WORKS 2.1 PIN Lock It is most basic idea of security application. A PIN generally consistofa combinationof 4-digit(from0-9999)strong enoughnot to be guessed by anyone. It is very commonly used in smartphones to lock applications and even the screen of the phone. In order to unlock a locked application, the user applies the same no. sequence (4-digit PIN) which can easily be remembered by someone if once noticed. [4] 2.2 Alphanumeric lock Alphanumeric password is somehow similar to PIN but provides a higher level of security with a combination of numbersand alphabets and hence the name given to it. But when technically speaking it becomes more risky as the users apply the passwords related to their real lives such as their date of birth, pet name, name and many more which becomes very easy for the shoulder surfers or someone known to the user to guess the password. [1]
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 949 2.3 Pattern lock After finding the vulnerabilities and weaknesses of Pin and Alphanumeric locking scheme, an advanced an advanced scheme was introduced for security in smart- phones. Pattern security scheme gives a facility of complex formation or pattern to the user. It consist a User Interface having 9 dots arranged in 3*3 matrix. Instead of remembering passwords the user just have to remember the formation applied to lock the application. Even by using a 3*3 matrix of 9 blocks (dots) which gives a complex formation for higher security, I becomes very easy for the attackers (or the people around the user) to guess the pattern formation by continuously noticing the hand gestureswhenthe user is applying the pattern to the locked application. 2.4 Bio-metric lock Biometrics need the biological information of the user such as thumb-finger impression, face structure, voice pitch andtoning and retina size and color. All these need an external hardware and a big database to manage a successful secure application. The hardware needed is very costly and needs a very high maintenance. [3] 3. PROPOSED PLAN The work flow diagram shows the two processes: 3.1 Save the pattern and lock applications Fig -1: Save the pattern and lock applications First ow describes the initialization of the locking applications for the first time the user have to create the pattern and go through conformation of that pattern and then select the applications which needs security. The sequence will be saved. 3.2 Opening of the lock applications In the second ow, when the locked application will be opened the same UI of six color blocks will appeartoapplythe formation but this time the colors will be shuffled which will create a new pattern having the same sequence of colors.Thissequencewill be then compared with the
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 950 Fig -1: Opening of the lock applications sequence saved, if the pattern does not match the position n of the colors will reshuffled again and user will have to input the pattern again. If the pattern matches, the application will be unlocked. 3. SUMMERY Typically the inbuilt features and various locking systems are providing security to the applications in the smartphones, but they are not up to the mark. They are vulnerable to smudge attacks and shoulder surfing, where the passwords can be easily determined. In this paper, we analyzed the problem in the current locking schemes used in the smartphones. By providing shuffling of the colored blocks in a circular form, it improves security and users convenience. REFERENCES [1] Prof. V.J. Kadam, Taj Mohammad A. Raheman, Ajinkya Ajagekar and Sushant B. Patil, “Shoulder shuffling free graphical locker for android graphical pattern lock with text support for android devices", IJARCH, Volume 4, Issue 3. 2013. [2] Deepika Jyoti and Dr. Amandeep Verma, “Enhancement of the security of pass-go pattern password using shuffling grid- shapes", IJIRCCE, Volume 2, Issue 11. 2014. [3] Kwang Il Shin, Ji Soo Park, Jae Yong Lee and Jong Hyuk Park. “Design and implementation of improved authentication system for android smartphone users", 26th International Conference on Advanced Information Networking and Applications Workshops. 2012. [4] Ms. R. Srilekha and Mr. D. Jayakumar, “A secure screen lock system for android smartphonesusingaccelerometersensor", IJSTE, Volume 1, Issue10, 2015.
Download now