Submit Search
Upload
IRJET- Comparative Analysis of Different Graphical Password Techniques for Security
•
0 likes
•
8 views
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i4/IRJET-V5I4417.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
COLOUR LOCK SYSTEM FOR USER AUTHENTICATION
COLOUR LOCK SYSTEM FOR USER AUTHENTICATION
Journal For Research
Paper id 2520141232
Paper id 2520141232
IJRAT
Online rto management system
Online rto management system
DigneshPrajapati1
Secure Internet Voting System
Secure Internet Voting System
theijes
Privacy Preserving of Data Mining Based on Enumeration and Concatenation of A...
Privacy Preserving of Data Mining Based on Enumeration and Concatenation of A...
AM Publications
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
IRJET Journal
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
IRJET Journal
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
IRJET Journal
Recommended
COLOUR LOCK SYSTEM FOR USER AUTHENTICATION
COLOUR LOCK SYSTEM FOR USER AUTHENTICATION
Journal For Research
Paper id 2520141232
Paper id 2520141232
IJRAT
Online rto management system
Online rto management system
DigneshPrajapati1
Secure Internet Voting System
Secure Internet Voting System
theijes
Privacy Preserving of Data Mining Based on Enumeration and Concatenation of A...
Privacy Preserving of Data Mining Based on Enumeration and Concatenation of A...
AM Publications
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
IRJET Journal
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
IRJET Journal
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
IRJET Journal
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key Order
IRJET Journal
IRJET- Keystroke Dynamics for user Authentication
IRJET- Keystroke Dynamics for user Authentication
IRJET Journal
IRJET-Encryption of Broadcast with Dealership
IRJET-Encryption of Broadcast with Dealership
IRJET Journal
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET Journal
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
IRJET Journal
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET Journal
Blockchain Based Electronic Ballot System
Blockchain Based Electronic Ballot System
IRJET Journal
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
ijiert bestjournal
Design Package to Build and Evaluate Encryption Algorithms
Design Package to Build and Evaluate Encryption Algorithms
IOSRjournaljce
Online Votes and Fund analysis for political parties with Data Security
Online Votes and Fund analysis for political parties with Data Security
IJERA Editor
Online Votes and Fund analysis for political parties with Data Security
Online Votes and Fund analysis for political parties with Data Security
IJERA Editor
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET Journal
IRJET - Single Image Super Resolution using Machine Learning
IRJET - Single Image Super Resolution using Machine Learning
IRJET Journal
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
IRJET Journal
Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in Cloud
Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in Cloud
IRJET Journal
IRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET Journal
IRJET- Device Authentication Wireless Netework for Secured Communication
IRJET- Device Authentication Wireless Netework for Secured Communication
IRJET Journal
Colour Based Cryptography
Colour Based Cryptography
IRJET Journal
Choudhary2015
Choudhary2015
Amit Kabra
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to IRJET- Comparative Analysis of Different Graphical Password Techniques for Security
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key Order
IRJET Journal
IRJET- Keystroke Dynamics for user Authentication
IRJET- Keystroke Dynamics for user Authentication
IRJET Journal
IRJET-Encryption of Broadcast with Dealership
IRJET-Encryption of Broadcast with Dealership
IRJET Journal
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET Journal
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
IRJET Journal
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET Journal
Blockchain Based Electronic Ballot System
Blockchain Based Electronic Ballot System
IRJET Journal
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
ijiert bestjournal
Design Package to Build and Evaluate Encryption Algorithms
Design Package to Build and Evaluate Encryption Algorithms
IOSRjournaljce
Online Votes and Fund analysis for political parties with Data Security
Online Votes and Fund analysis for political parties with Data Security
IJERA Editor
Online Votes and Fund analysis for political parties with Data Security
Online Votes and Fund analysis for political parties with Data Security
IJERA Editor
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET Journal
IRJET - Single Image Super Resolution using Machine Learning
IRJET - Single Image Super Resolution using Machine Learning
IRJET Journal
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
IRJET Journal
Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in Cloud
Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in Cloud
IRJET Journal
IRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET Journal
IRJET- Device Authentication Wireless Netework for Secured Communication
IRJET- Device Authentication Wireless Netework for Secured Communication
IRJET Journal
Colour Based Cryptography
Colour Based Cryptography
IRJET Journal
Choudhary2015
Choudhary2015
Amit Kabra
Similar to IRJET- Comparative Analysis of Different Graphical Password Techniques for Security
(20)
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Keystroke Dynamics for user Authentication
IRJET- Keystroke Dynamics for user Authentication
IRJET-Encryption of Broadcast with Dealership
IRJET-Encryption of Broadcast with Dealership
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
Blockchain Based Electronic Ballot System
Blockchain Based Electronic Ballot System
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
Design Package to Build and Evaluate Encryption Algorithms
Design Package to Build and Evaluate Encryption Algorithms
Online Votes and Fund analysis for political parties with Data Security
Online Votes and Fund analysis for political parties with Data Security
Online Votes and Fund analysis for political parties with Data Security
Online Votes and Fund analysis for political parties with Data Security
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET - Single Image Super Resolution using Machine Learning
IRJET - Single Image Super Resolution using Machine Learning
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in Cloud
Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in Cloud
IRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Device Authentication Wireless Netework for Secured Communication
IRJET- Device Authentication Wireless Netework for Secured Communication
Colour Based Cryptography
Colour Based Cryptography
Choudhary2015
Choudhary2015
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
ranjana rawat
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls in Nagpur High Profile
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
humanexperienceaaa
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Recently uploaded
(20)
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
IRJET- Comparative Analysis of Different Graphical Password Techniques for Security
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1873 Comparative analysis of different graphical password techniques for security Manasi Shah1, Radhika Naik2, Sheetal Mullakodi3, Sangita Chaudhari4 1,2,3Students, Dept. of Computer Engineering, Vidyavardhini’s College of Engineering and Technology, Maharashtra, India. 4Professor,Dept. of Computer Engineering, Vidyavardhini’s College of Engineering and Technology, Maharashtra, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - There are different schemes proposed for shoulder surfing resistant graphical password but most of the users are familiar with a textual password than graphical password. As textual passwords are liable to many security problems, text-based graphical password has been proposed but unfortunately even it has proved to be both unsecure and inefficient. This scheme is proposed in order to make the login system easy and efficient. We also manifest the resistance of the proposed technique to shoulder surfing and accidental login thereby analyzing its security and usability. Supporting the users in selecting passwords of higher security is the main objective of knowledge-based authentication systems, in the sense of being from an expanded effective security space. Key Words: shoulder surfing, security, usability, authentication. 1. INTRODUCTION Shoulder surfing is an effective way to get information in crowded places and see the people enteringtheirpasswords for authentication at a site. Conventional password schemes are unprotected to shoulder surfing[1]. To overcome these vulnerabilities of textual methods, graphical password techniques are used. In this Project we are dealing with different graphical password systems which have an upper hand in security with respect to textual passwords as they are resistant to shoulder surfing, dictionary attacks, brute force attacks to much greater extent as compared to textual passwords[2]. The following are the techniques: 1. Hybrid textual Authentication Scheme 2. Shuffling 3. Hybrid Shuffling 4. Huebox The scheme has features as a secure system for authentication, immune to shoulder surfing, hidden camera and brute force attacks. This system can be applied to more than just authenticationmechanism.Thisisapplicablewhere more sensitive data like ATM pins, Account passwords and Social Security numbers are to be entered. Data can be transferred without it leaking. 2. EXISTING SOLUTIONS 2.1. Hybrid Textual Authentication Technique This also consists of registration, login and verification phases. In registration phase, user has to first enter a username and afterwards has to rate colors from 1 to 8 randomly as shown in Figure-2.1(a) and can remember it as “RBGYKGOP”. During login phase, after entering a correct username the login interface based on colors selected by users is displayed as shown in Figure-2.1(b). It consists of grid (strip of colors) and number grid of size 8×8. The grid consists of 4 pairs of colors. Each pair represents the row and column for the number grid. It means first represents the row and second represents the column of the number grid. In number grid the numbers from 1-8 are randomly placed on the grid. According to the pair, the number in the intersection of the row and column of the number grid is the part of session password. For example, consider the ratings in Figure-2.1(a) and login interfaceinFigure-2.1(b).Thefirst pair that system has generated are red and yellow colors. The rating for red is 1 and rating is 3 for yellow. So the first number in session password is the intersection of 1st row and 3rd column that is 3. The same method is repeated for all other pairs. So here for login interface shown in Figure- 2.1(b) the password is “3573”. Here also authentication server verifies the password entered by user and if it is correct then user is allowed to enter into the system. In this, also at every login both the grid and number grid varies and so session password changes for every session and thus,it is also resistant to brute force, shoulder surfing and guessing attack[3][4][5]. Figure -2.1(a): Color ratings
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1874 Figure -2.1(b): Login interface 2.2. Color shuffling technique We will see a simple and efficient shoulder surfing resistant graphical password scheme based on texts and colorsinthis section. The characters used in this proposed scheme is a total of 64, including 26 lower case letters, 26 upper case letters, 10 decimal digits, and symbols “.” and“/”asshown in the Figure-2.2.2. This proposed scheme include two phases, one is registration phase and second is login phase[6]. 2.2.1. Registration phase The user has to set his textual password K of length L(8≤L≤15) characters, and choose one as his pass from 8 colors assigned by the system as shown in the Figure-2.2.1. The remaining 7 colors which are not chosen by the user are called decoy colors. If the user wants to re-enable his disabled account, the user has to register an e-mail address for the same. The registration phase should be progressed further in an environment free of shoulder surfing. Additionally, during the registration phase a secure channel should be established between the system and the user by using SSL/TLS or any other securetransmissionmechanism. The system stores the user’s textual password in the user’s entered password table, which should be encrypted by the system[6]. Figure -2.2.1: Registration Phase for color shuffling 2.2.2. Login Phase When user requests to login the system, then the system displays a circle composed of 8 equally sized sectors. That is our project login screen. In that login screen colors of the arcs of the 8 sectors are different, and each sector is identified by the of its arc, example- the blue sector is the sector of blue arc. Initially, 64 characters including uppercase, lowercase alphabets, numbers and special characters are placed among these sectorsrandomlytoform a session password every time the userlogins.Thedisplayed characters can be concurrently rotated into either the adjacent sector clockwise by clicking the clockwise button once or the adjacent sector anticlockwise by clicking the anticlockwise button once according to the proximity of the character in the sector to reach the color mentioned during the registration phase. The login screenofthistechniquecan be illustrated by an example shown in Figure-2.2.2. To login the system, the user has to finish the following steps[6][7]: Step 1: The user requests to login the system. Figure -2.2.2: Color wheel for login Step 2: The button for rotating clockwise, the button for rotating anticlockwise, the “Confirm”button,andthe“Login” button are also displayed on the login screen. For each login session, two wheels are generated, inner wheel of random characters and outer wheel consisting of colors. A 8X8 matrix is used to storethecharactersandnumbersrandomly and during each session it will produce characters in each sector randomly using random generation function. The rotate buttons will perform transformation operation on matrix to rotate the sectors clockwise or anti-clockwise. Let I= 1. Step 3: The user has to rotate the sector containing the i-th pass character of his password K, denoted by Ki, into his pass-sector, and then clicks the “Confirm” button. Let i = i + 1.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1875 Step 4: If i < L, the system random Permuted all the 64 displayed characters, and then goto`s step 3. Otherwise, the user has to click the “Login” button to complete the login process. If for three consecutive times the user could not login into the account or if the user’s account is not authenticated then the user’s registered password is sent to the user’s registered email-address so that the legitimate user can access the login system. The user has to rotate the sector containing Ki into his pass- sector. Algorithms Random Number Generation Input: 64 character a to z=26, A to Z=26,0to9=10,and"./"=2 Output: Random Printing Algorithm: 1. To generate the matrix with row and column 8*8. 2. Put 0 to 63 numbers into matrix. 3. Select one random number from 0 to 63. 4. For putting number into matrix system check number is already present or not. 5. If number is present then perform step3. If not present then put into a matrix and go to setp3. 6. Do step 5 repeatedly upto 0 to 63 inserted into matrix. 7. Print the matrix. 8. Now get string which have 64 character "a to z=26, A to Z=26, 0 to 9=10, and . /=2". 9. Get number present into matrix sequentially [0][0] to [8][8] i.e., total 64 characters . 10. Select index of string from 64 characters put into that current location. 11. Do step 9 and 10 repeatedly upto [8][8] number. 12. Print current matrix with string char. 13. Display a matrix with random printing. 14. Stop[8]. 3. PROPOSED SCHEME 3.1. Hybrid Color Shuffling Technique Our proposed scheme i.e. Hybrid Shuffling and Huebox both have proved to be the most efficient technique amongst the four graphical password techniques using the following parameters: Usability, user friendliness, time complexity, space complexity, login time, response time, types of possible attacks, user interface, etc as shown in Figure-4. A 8X8 matrix is used to store the characters and numbers randomly and during each session the system will produce characters in each box randomly using random generation function. 3.1.1. Registration Phase User will enter a username and textual password. User will also enter a color of their preference and give a rank to it. Registration phase of Hybrid Color Shuffling is shown in Figure-3.1.1. Figure -3.1.1: Registration phase for Hybrid Color Shuffling. 3.1.2. Login Phase Each login session, three wheels are generated, inner wheel of random characters and second wheel of colors and outermost of rank as shown in Figure-3.1.2. A 8X8 matrix is used to store the characters and numbers randomly and during each session will produce characters in each sector randomly afterusingrandomgenerationfunction.Therotate buttons will perform transformation operation on matrix to rotate the sectors clockwise or anti-clockwise. Figure -3.1.2: Color and rank wheel for login 3.2. Huebox 3.2.1. Registration Phase During registration, the user will havetoentertheusername and password. The password that user enters are of three categories i.e. Text, rank and color as shown in Figure-3.1.1. In comparison to the first two techniques, along with text and color, our proposed scheme includes rank which makes hybrid shuffling technique moresecure.Apartfrom entering
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1876 the username and password, the user is also askedtoentera valid email address in case of forgotten password. 3.2.2. Login Phase Once the user clicks on the login button, the system displays a tabular representation of hybrid color shuffling technique. It includes first row consisting of numbers, second row consisting of colors and the last row consisting of characters that are randomly placed. The numbers in the first row are static whereas the other two rows can be shuffled clicking the buttons as shown in Figure-3.2.2.Theuserwill first bring the color under the user specified rank which is static using color left shift and color right shift button and click on confirm button. Thus, we can say that first authentication is done. Now, the user brings the characters under the specified (which the user has entered) using text left shift button and text right shift button and confirm after each character of the password is brought under the . Finally, the user clicks on Login button. For eachlogin,sessionpassword is generated. If the user fails to recollect his password, the password will be sent to the user’s registered email address. The third scheme allowstheuserfortwo-wayauthentication providing more secure, efficient and friendly technique as well. Figure -3.2.2: Tabular representation of colors and ranks for login 4. CONCLUSION Thus, project “Comparative Analysis of Different Graphical Password Techniques for Security”, would ease the traditional way of securing, processing and retrieving the users data. Our system is a web service which can be beneficial to many websites or systems that use authentication. The success of this project would be providing secure login to the user using the interactive GUI of this system thus making it complex for the attacker who intends to tamper with the crucial information of the user. Figure -4: Comparative analysis of different graphical password techniques ACKNOWLEDGEMENT We have taken efforts in this project. However, it would not have been possible without the kind support and help of many individuals and organizations.Wewouldliketo extend our sincere thanks to all of them. We are highly indebted to our HOD and our project guide of the Computer Engineering Department for their guidance and constant supervision as well as for providing necessary information regarding the project and also for their support in completing the project. Our thanks and appreciation also go to our colleagues in developing the project and people who have willingly helped us out with their abilities.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1877 REFERENCES [1] Vishal Janjalkar, Shekhar Mulik, Archana Nanade, "Authentication Scheme For Session Password Using Play-Fair Cipher", IJARCET, Volume 5 Issue 3, March 2016. [2] Priyanka S. Kedar , Vrunda Bhusari ,"UsingPBKDF2Pair & Hybrid technique for Authentication", IJERMT (Volume-3, Issue-5),May 2014. [3] Rohit Jagtap, Vaibhav Ahirrao, Vinayak Kadam, Nilesh Aher, "Authentication schemes for session password using and special characters" , IJIACS, Volume3,Issue2, April 2014. [4] M Sreelatha, M Shashi, M Anirudh, MD Sultan Ahamer, V Manoj Kumar, "Authentication Schemes for Session Passwords using and Images", IJNSA, Vol.3, No.3, May 2011. [5] Miss.Swati Tidke, Miss Nagama Khan, Miss.Swati Balpande, "Password Authentication Using Text and Colors", IJSRET, ISSN Volume 4, Issue 3, March 2015. [6] Sumit H. Wagh, Aarti G. Ambekar, "Shoulder Surfing Resistant Text-basedGraphical PasswordScheme",IJCA, ICCT 2015. [7] Mrs. Nagamani K, Bhange Yogita, Bhoir Dhanashree, Dalavi Rani, "A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme", IJARCCE, Vol. 6, Issue 3, March 2017. [8] Aayush Dilipkumar Jain, Ramkrishna Khetan, Krishnakant Dubey, Prof. Harshali Rambade, " Shuffling Password Based Authentication", IJESC ,Volume 7 Issue No.4, 2017.
Download now