Submit Search
Upload
IRJET - Securing Social Media using Pair based Authentication
•
0 likes
•
11 views
IRJET Journal
Follow
https://www.irjet.net/archives/V7/i4/IRJET-V7I429.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
IJNSA Journal
Ai4506179185
Ai4506179185
IJERA Editor
Jc2516111615
Jc2516111615
IJERA Editor
3 d password
3 d password
Izhar Cheema
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET Journal
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
eSAT Publishing House
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
Kailas Patil
2 round hybrid password scheme
2 round hybrid password scheme
IAEME Publication
Recommended
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
IJNSA Journal
Ai4506179185
Ai4506179185
IJERA Editor
Jc2516111615
Jc2516111615
IJERA Editor
3 d password
3 d password
Izhar Cheema
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET Journal
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
eSAT Publishing House
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
Kailas Patil
2 round hybrid password scheme
2 round hybrid password scheme
IAEME Publication
CARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PAS
International Journal of Technical Research & Application
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
eSAT Publishing House
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
IJNSA Journal
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
eSAT Journals
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
IRJET Journal
Sudhanshu Raman
Sudhanshu Raman
Sudhanshu Raman
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
IOSR Journals
Vshantaram
Vshantaram
sparsh dwivedi
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
IOSR Journals
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique
cscpconf
Graphical password minor report
Graphical password minor report
Love Kothari
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical Password
IOSR Journals
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
IJCSIS Research Publications
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
LeMeniz Infotech
Graphical authintication
Graphical authintication
Tapesh Chalisgaonkar
An Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for Authentication
IJNSA Journal
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
IJET - International Journal of Engineering and Techniques
Authentication Using Graphical Password
Authentication Using Graphical Password
ijceronline
Graphical Password by Image Segmentation
Graphical Password by Image Segmentation
IRJET Journal
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Password
ijtsrd
Graphical Password Authentication
Graphical Password Authentication
IRJET Journal
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET Journal
More Related Content
What's hot
CARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PAS
International Journal of Technical Research & Application
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
eSAT Publishing House
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
IJNSA Journal
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
eSAT Journals
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
IRJET Journal
Sudhanshu Raman
Sudhanshu Raman
Sudhanshu Raman
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
IOSR Journals
Vshantaram
Vshantaram
sparsh dwivedi
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
IOSR Journals
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique
cscpconf
Graphical password minor report
Graphical password minor report
Love Kothari
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical Password
IOSR Journals
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
IJCSIS Research Publications
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
LeMeniz Infotech
Graphical authintication
Graphical authintication
Tapesh Chalisgaonkar
An Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for Authentication
IJNSA Journal
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
IJET - International Journal of Engineering and Techniques
Authentication Using Graphical Password
Authentication Using Graphical Password
ijceronline
What's hot
(18)
CARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PAS
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
Sudhanshu Raman
Sudhanshu Raman
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Vshantaram
Vshantaram
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique
Graphical password minor report
Graphical password minor report
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical Password
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
Graphical authintication
Graphical authintication
An Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for Authentication
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
Authentication Using Graphical Password
Authentication Using Graphical Password
Similar to IRJET - Securing Social Media using Pair based Authentication
Graphical Password by Image Segmentation
Graphical Password by Image Segmentation
IRJET Journal
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Password
ijtsrd
Graphical Password Authentication
Graphical Password Authentication
IRJET Journal
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET Journal
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
IRJET Journal
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
IJCSIS Research Publications
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
ijiert bestjournal
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET Journal
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET Journal
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
IOSR Journals
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password System
IJNSA Journal
Survey on Graphical Password by Image Segmentation 2021 2022
Survey on Graphical Password by Image Segmentation 2021 2022
ijtsrd
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
cscpconf
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET Journal
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Scheme
paperpublications3
Shoulder surfing resistant graphical
Shoulder surfing resistant graphical
Kamal Spring
A presentation on graphical passwords
A presentation on graphical passwords
ChikaDavidAma
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
IJMER
Similar to IRJET - Securing Social Media using Pair based Authentication
(20)
Graphical Password by Image Segmentation
Graphical Password by Image Segmentation
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Password
Graphical Password Authentication
Graphical Password Authentication
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password System
Survey on Graphical Password by Image Segmentation 2021 2022
Survey on Graphical Password by Image Segmentation 2021 2022
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Scheme
Shoulder surfing resistant graphical
Shoulder surfing resistant graphical
A presentation on graphical passwords
A presentation on graphical passwords
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
C Sai Kiran
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
k795866
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
asadnawaz62
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
dollysharma2066
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
ssuser2ae721
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
me23b1001
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
Purva Nikam
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
KartikeyaDwivedi3
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
roselinkalist12
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
computer application and construction management
computer application and construction management
MariconPadriquez1
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Recently uploaded
(20)
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
computer application and construction management
computer application and construction management
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
IRJET - Securing Social Media using Pair based Authentication
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 134 Securing Social Media using Pair based Authentication Shaikh Huzaif1, Yadav Swapnali2, Kale Vaishnavi3, Hirave Kanifnath4 Department of Computer Engineering, H.S.B.P.V.T College of Engineering, Kashti -------------------------------------------------------------------------***------------------------------------------------------------------------ Abstract— Early we use Textual passwords as a security but these passwords are vulnerable to the various attacks like Dictionary attack, Shoulder surfing, eves dropping, etc. Further graphical passwords are coming to the existence but the graphical passwords have their own disadvantages like they require more time to Authenticate and the usability issues. Thus we proposed a session password scheme in which the passwords are used only once for each and when session is terminated the password is no longer in use. The proposed of session password scheme uses Text and colors for generating session password. Two session password schemes are used Hybrid Textual Authentication Scheme and Pair-based Authentication scheme. Index Terms— Authentication, Password, Pair-based Authentication scheme I. INTRODUCTION The most popular user authentication approach is the text-based password scheme in which a user enters a login name and password. Despite of its wide usage, the Textual passwords have a number of short comes. The Simple and straightforward textual passwords are easy to Remember, but they are more vulnerable for attackers to break. Whereas the complex and arbitrary passwords makes the system more secure, resisting the brute force search and dictionary attacks, but the difficulty lies in retaining them. Besides this, textual passwords are liable to the shoulder- surfing, hidden cameras, and spyware attacks. Consequently, graphical password strategies have been introduced as a substitute for textual passwords schemes, as pictures can be easily remembered when compared with words. Furthermore, it is difficult to formulate automated attacks for graphical passwords. Moreover the password space of the graphical password scheme may extend that of the textual based password schemes and hence probably providing a higher level of security means. On the account of these reasons, there is an intensifying interest in the graphical password methods. However, most of the existing graphical password authentication methods suffer from shoulder surfing, a known hazard where an intruder can scrutinize the password by recording the authentication session or through direct surveillance. In addition, setting up a system that offers the graphical authentication schemes is substantially costlier than the text based password methods. Even though some of the graphical password procedures resistant to the shoulder surfing are proposed, yet they have their own downside like usability issues or consuming additional time for user to login or having tolerance levels. Based on these various reasons pointed out, session passwords are instigated. Session passwords are those that can be used only at that particular instant. As soon as the session expires, the password is no longer valid. As such the user, keys in distinct passwords each time he logs into the session. In this paper, we have designed a project whose objective is to provide security to the confidential files residing in system. Here, any user who needs to the access those files has to first get registered by the administrator (admin) of that particular organization. The registered user is then allowed to login using session passwords through either of the two authentication techniques that have been proposed in the forthcoming sections. Subsequently, the user is allow for graphical authentication scheme. If the user is ascertained as the genuine person then he is given the rights to access the confidential files or else he is regarded as malefactor. The rest of the paper is organized as follows. Section II describes about various existing graphical authentication schemes. Proposed project work is depicted in Section III. Section IV gives conclusion to the paper. Future Scope is pointed out in Section V. II. RELATED WORK Graphical password is a type of knowledge based authentication. Thus, graphical passwords consist of images and visual representation which are used in replacement to text or alphanumeric characters. The graphical passwords consist of four sections namely: A) Recognition based technique B) Pure Recall based technique C)Cued-recall based technique D)Hybrid based technique a) Recognition Based Technique: In this technique, users have to choose the image or symbols from a set of images. At the time of registration, the users select images which is set as user’s password. Thus, during authentication users have to remember this password from a collection of different images [8].90% of users were able to identify their password images. Also, users were able to remember their passwords after a time span of 45 days[9]. b) Pure recall based technique: In this technique users set as image as a password during registration. Users need to reproduce or remember their own passwords and thus no clues are given to remind the passwords. This scheme is simple, easy but the difficulty in this technique is that passwords are hard to remember. It is more secure compared to recognition based scheme. It is quite similar to DAS (1999) and Qualitative DAS (2007). c) Cued recall based technique: In this technique users generate a password during authentication with the help of a hints or reminders. It is quite similar to recall based scheme but it
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 135 is recall with cueing. d) Hybrid based technique: In this technique authentication happens through the combination of two or more schemes. Thus, it overcomes the drawback of a single scheme. For e.g.: spyware, shoulder surfing etc... A. Recognition based Technique In this technique users set as image as a password during registration. Users need to reproduce or remember their own passwords and thus no clues are given to remind the passwords. This scheme is simple, easy but the difficulty in this technique is that passwords are hard to remember. It is more secure compared to recognition based scheme. It is quite similar to DAS (1999) and Qualitative DAS (2007) recognition based scheme is also known as cognometric scheme or search scheme. a)Dhamija and Perrig: Proposed a scheme in the year 2000. In this scheme, users have to choose a random image from a set of images. The set of images are generated by the program executed in a system. During the authentication phase, the system provides the user with a set of images which consist of both decoy as well as password images. The user has to select the right set of images from a set of password and decoy images. The initial seeds are used to generate these images thus it becomes to store up but it is difficult to share or record these images. Deja vu scheme has its shortcomings such as ambiguous images are difficult to remember and the password space is less as compared to the textual password. b) Passface scheme: This was proposed by Brostoff. In this scheme, users have to choose four faces as a password. So, during the authentication phase, user is provided with a grid of size 3x3 shown in Fig 1, the user has to recognize one face from a set of nine face and click on it. This process continues until four faces have been selected by the user as a valid password. There are limitations such that it can be easily guessed and processing time is quiet longer than that of textual passwords. c) Jensen: proposed a scheme in the year 2003.This scheme was mainly focused on PDAs. It is also known as picture password scheme. The user has to select image of size 40x40 from a 5x5 matrix. Thus, order of selection of image is also verified during the authentication phase i.e. It should be the same sequence of order as in registration phase. The disadvantage of this method is the memorability is more complex and difficult. d) Story: is quite similar passfaces scheme was proposed by Davis. In this scheme, users have to select a sequence of images to form a portfolio. During login, users have to choose the images and their portfolio images. It is also required for the user to choose the image in the correct order to remember their passwords, user mentally construct a story by connecting the set of images. e) Sobardo and Birget: proposed a scheme which focuses mainly on the shoulder surfing problem. In first method, the system displays a number of objects. During the authentication user chooses these pass-objects and click inside of a convex hull formed by the pass-objects. In order to show the password is difficult to guess. Sobardo and Birget formed a scheme, in which 1000 objects are used to make the display crowded and making it indistinguishable. f) Man et al: proposed a method which is resistant to shoulder surfing attack. In Fig 2,The users have to select a number of images as a password object or pass-objects. Each pass-object has variants and each variant is assigned a unique code. Thus, during authentication user has to choose the pass-object from several scenes. Thus, user has to type a unique code along with a string along with a code indicating the relative location of the pass-objects. Graphical Password with Icons[GPI]: was designed to solve the problem of hotspot. In GPI users have to select 6 icons from 150 icons to set as a password. In this scheme, the GPIs system generate a password which is authenticated by the user and if the user is not satisfied with the password, the user can request to generate a new password. The drawback of this scheme is the icon size is very small and unacceptable login time. B. Pure Recall Based Technique: Pure recall based scheme is also known as drawmetric scheme, where the users have to recall drawing on grid, that they selected registration phase. In this scheme, users have to draw password either onto a grid or a blank canvas. a) Jermyn: proposed a method called "Draw-A - Secret"(DAS). Users have to draw a password on a 2D grid using stylus or mouse. The drawing may consist of a single stroke or multiple strokes. Thus, for the user to successfully login, users redraw the same path, passing through the grid cells as shown in Fig 3. The system database stores the password in the same sequence of coordinate of the grid encoded during the DAS password. The length of the password depends on the number of coordinate pairs. There is no need for user to remember any alphanumeric characters. The difficulty with this technique the user has to redraw at the exact position of the grid line. b) Thorpe and Van Oorschot: proposed a graphical password scheme based on Jermyn. They introduced graphical dictionaries and using these dictionaries, they studied the brute force attack. They set a length parameter for DAS password and proved that DAS password of length 8 is less susceptible to dictionary attack. They also proved that space of mirror symmetric graphical password is smaller than DAS password space. People tend to recall symmetric images better than asymmetric images. Therefore, users tend to choose mirror symmetric passwords.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 136 c) Varenhorst: proposed a graphical password scheme called passdoodle which allows user to create a free hand drawing as a password as shown in Fig 4. There is no visible grid. It consists of two pen strokes which drawn on the screen using a number of colors. Matching of passdoodle is more complex. In this system, doodle is stretched and scaled and then compared with stored user password. d) Weiss: proposed the graphical password scheme passhapes. In the system, geometric shapes are generated on basis of the combination of eight strokes. During login, there is no grid and password can be drawn on any position. Thus, passshapes offer memorability. e) Syukri algorithm: is based on pure recall based system, thus user is authenticated by drawing their signature with the help of a mouse or stylus. This method has two stages registration & verification. During registration, the user draws the signature with a mouse and system extracts area under signature and saves the information to the database. The verification stage involves the user to place signature and then extracts the parameter of the signature. Thus, verification involves using a geometric average and thus update a database. The biggest advantage there is no need to memorize one's signature and also signature are hard to fake. There are two commercial products based on pure recall based graphical password scheme. First, there is an unlock scheme which is similar to a mini pass-go that unlocks screen of an android smart phones. In this user chooses his unlocking pattern by dragging with finger over points in 3x3 grid. Second, in Windows 8 system, Microsoft has introduced a new graphical password. Users are provided with an image and have to draw gestures on the image provided. Gestures could include: top, circle and straight line or combination of these gestures. Thus, these two products show that simple to operate easy to remember and can be applied to a system where there is no need for a high security level III. SECURITY ATTACKS ON GRAPHICAL PASSWORD SYSTEMS a) Dictionary Attack: In this type of attack, an attacker tries to guess the password from a dictionary which is a collection of list of words. Dictionary consists of all passwords based on the previous selections and all the passwords have high probability. Thus, if a user chooses a password, which is present in the dictionary, then the attack is successful. This attack is based password brute forcing. b) Guessing Attack: Many a times, user prefer to choose their passwords based on their personal information such as house name, phone number, etc... In most of these cases, the attacker tries to guess the password by accessing the user's personal information. Guessing attacks can be categorized into two: online password guessing and offline password guessing attacks. In online password guessing, the attack guesses a password by manipulating inputs of one or more than one oracles. In offline, password guessing attacker searches for the password through manipulation of inputs of one or more than one oracles. c)Shoulder Surfing Attack: In shoulder surfing attack, the attacker watches over the behaviour of the user based on the direct observation technique.one of the direct observation technique, is looking over the persons shoulder to trace the password. It usually occurs in public places. d)Spyware Attack: Spyware is kind of a malicious software installed onto user’s computers with aim to steal information of users. The method to execute a spyware attack is either through key logger or key listener. This malware collects the information about the user without his/her knowledge and thus leak this information to an outsider. e) Social Engineering Attack: Social engineering attack takes place through human interaction which causes users to give out sensitive information. In this type of attack, the attacker fakes himself to be an employee of an organisation and tries to interact with user to collect information related to the organisation. The attacker does not use any kind of electronic gadget but with his/her own intelligence and tricky conversation to get information he/she want. IV. Proposed System Authentication technique consists of four phases: 1. Registration phase 2. Login phase 3. Verification phase 4. Recovery phase During registration, user rates the colors in the first method or enters his password in the second method. During login phase, the user has to put the password based on the interface displayed on the screen. The entered password verifies by the system by comparing with content of the password generated during registration. During recovery phase, if user forgets his password, he may recover the password by answering security questions which user had selected during registration phase 1. Admin Phase In admin phase administrator can see the on line users and can see the user’s information. Only has authority to see the information. He enter the user name and password to see the user information 2. Registration Phase In this phase if the user is not registered then first he can register his information as
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 137 shown in fig. 8 As shown in fig.8 user can enter user name, mobile number, first name, last name, email-id and choose the color code as secret password used for Hybrid based technique and submit the information. 3. Login Phase After registration user can login; user got his password on his email-id and his mobile number. In login user enter his user name and user id After login two technologies displayed on the screen for user. User can select any technique for login. There are two techniques, one Pair based technique and another Hybrid based technique 4. Pair-Based authentication scheme During registration user submits his password. Minimum length of the password is 8 and it can be called as secret pass. The secret pass should contain even number of characters. Session passwords are generated based on this secret pass. During the login phase, when the user enters his username an interface consisting of a grid is displayed. The grid is of size 6 x 6 and it consists of alphabets and numbers. These are randomly placed on the grid and the interface changeseverytime Fig 1. Pair-Based authentication scheme User has to enter the password depending upon the secret pass. User has to consider his secret pass in terms of pairs. The session password consists of alphabets and digits The first letter in the pair is used to select the row and the second letter is used to select the column. The intersection letter is part of the session password. This is repeated for all pairs of secret pass. Fig 8 shows that L is the intersection symbol for the pair “AN”. The password entered by the user is verified by the server to authenticate the user. If the password is correct, the user is allowed to enter in to the system. The grid size can be increased to include special characters in the password. V. IMPLEMENTATION DETAILS 1. Module Descriptions A module description provides detailed information about the module and its supported components, which is accessible in different manners. The included description is available by reading directly, by generating a short html- description, or by making an environment check for supported components to check if all needed types and services are available in the environment where they will be used. This environment check could take place during registration/installation or during a separate consistency check for a component. 1.1 Overall System Overview The proposed system using new Authentication technique consists of 3 phases: registration phase, login phase and verification phase. During registration, user enters his password in first method or rates the colors in the second method. During login phase, the user has to enter the password based on the interface displayed on the screen. The system verifies the password entered by comparing with content of the password generated during registration. 1.1.1 Registration Phase: In this phase if the user is not registered then first he can register his information. User can enter name, user name, mobile number, and email-id and choose the secret password used for Pair based technique and submit the information.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 138 1.1.2 Login Phase After registration user can login, using his username. It will check entered username is an existing or not if username is valid, it will process, else it gives error message. 1.1.3 Pair Based Authentication scheme During registration user submits his password. Minimum length of the password is 8 and it can be called as secret pass. The secret pass should contain even number of characters. Session passwords are generated based on this secret pass. During the login phase, when the user enters his username an interface consisting of a grid is displayed. The grid is of size 6 x 6 and it consists of alphabets and numbers. These are randomly placed on the grid and the interface changes every time User has to enter the password depending upon the secret pass. User has to consider his secret pass in terms of pairs. The session password consists of alphabets and digits. 1.1.4 Profile Phase Once successfully Logged in the user will enter to his profile where he/she can perform following things: Send friend request. Rate friends which is depending on how much he/she is active on the site. Can update his/her status. 1.1.5 OTP Phase For rating friend the user should be the friend of the rater. The user will receive an OTP on the mobile number register during the registration process. This OTP is supposed to enter for verification of the user and to enter the rate friend. 1.1.6 Rating Friend Rating friend is a person who can rate his/her friends. He/she can rate according to some criteria on which the friend can know about his friend being active or not i.e. the no. of status been uploaded by the friend, no. of photos been uploaded by the friend. 1.2 Algorithms: Algorithm: Algorithm means set of rules to be followed and the steps are as follows: 1 The new user will register on the site which will include important details as : • Name • Username • Password The password to be used in pair based authentication will be even length. • E-mail ID of the user • Phone number of user 2 After the user has registered successfully then he can proceed to Login. • Enter username. • Enter the Password (Even alphabets only). 3 When successfully Logged in the user will enter to his profile. where he/she can perform following things: • Send friend request. • Rate friends which is depending on how much he/she is active on the site. Can update his/her status. For rating his/her friend the user should be the friend of the rater. The user will receive an OTP on the mobile number register during the registration process. This OTP is supposed to enter for verification of the user and to enter the rate friend. VI. CONCLUSION In this paper, two authentication techniques based on text and colors are proposed for PDAs. These techniques session passwords and are resistant to dictionary attack, brute force attack and shoulder-surfing. Both the techniques use grid for session passwords generation. Pair based technique requires no special type of registration; during login time based on the grid displayed a session password is generated. For hybrid textual scheme, ratings should be given to colors, based on these ratings and the grid displayed during login, session passwords are generated. However these schemes are completely new to the users and the proposed authentication techniques should be verified extensively for usability and effectiveness. VII. FUTURE SCOPE Future scope of this technique is that , as it provides more security than the others existed systems more secure login of users is possible .so this technique is not just limited for PDA i.e. personal digital Assistant but also it is very useful for providing protection against Hacking, Dictionary attacks, etc. In future it will be used for Banking Applications, Mobile phones applications where the security is more important. It also use with the 3D password technique for providing more and more security. VII. REFERENCES [1] R. Dhamija, and A. Perrig. “Déjà Vu: A User Study Using Images for Authentication”. In 9th USENIX Security Symposium, 2000. [2] Jermyn, I., Mayer A., Monrose, F., Reiter, M., and Rubin., “The design and analysis of graphical passwords” in Proceedings of USENIX Security Symposium, August 1999. [3] A. F. Syukri, E. Okamoto, and M. Mambo, "A User Identification System Using Signature Written with Mouse," in Third Australasian Conference on Information
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 139 Security and Privacy (ACISP): Springer-Verlag Lecture Notes in Computer Science (1438), 1998, pp. 403-441. [5] G. E. Blonder, "Graphical passwords," in Lucent Technologies, Inc., Murray Hill, NJ, U. S. Patent,Ed. United States, 1996. [6] Passlogix, site http://www.passlogix.com. [7] Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang Liu Uwe Aickelin, “A New Graphical Password Scheme Resistant to Shoulder-Surfing [8] S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy, N. Memon, “Design and longitudinal evaluation of a graphical password system”. International J. of Human-Computer Studies 63 (2005) 102-127.
Download now