Submit Search
Upload
IRJET- A Shoulder-Surfing Resistant Graphical Password System
•
0 likes
•
31 views
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i3/IRJET-V5I3805.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
eSAT Publishing House
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
IJNSA Journal
Authentication Using Graphical Password
Authentication Using Graphical Password
ijceronline
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
IJERA Editor
Ai4506179185
Ai4506179185
IJERA Editor
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
IJCSIS Research Publications
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
IRJET Journal
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
IJCSIS Research Publications
Recommended
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
eSAT Publishing House
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
IJNSA Journal
Authentication Using Graphical Password
Authentication Using Graphical Password
ijceronline
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
IJERA Editor
Ai4506179185
Ai4506179185
IJERA Editor
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
IJCSIS Research Publications
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
IRJET Journal
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
IJCSIS Research Publications
2 round hybrid password scheme
2 round hybrid password scheme
IAEME Publication
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
IRJET Journal
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
IOSR Journals
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based Authentication
IRJET Journal
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
IJNSA Journal
Ko3618101814
Ko3618101814
IJERA Editor
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...
Alexander Decker
Research ppr
Research ppr
Sara Sahu
IRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET Journal
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET Journal
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
IRJET Journal
Jc2516111615
Jc2516111615
IJERA Editor
User Identity Verification Using Mouse Signature
User Identity Verification Using Mouse Signature
IOSR Journals
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
IJERA Editor
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique
cscpconf
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
IRJET Journal
20320130406009
20320130406009
IAEME Publication
Authentication framework using visual cryptography
Authentication framework using visual cryptography
eSAT Publishing House
Graphical Password by Image Segmentation
Graphical Password by Image Segmentation
IRJET Journal
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Password
ijtsrd
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based Authentication
IRJET Journal
More Related Content
What's hot
2 round hybrid password scheme
2 round hybrid password scheme
IAEME Publication
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
IRJET Journal
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
IOSR Journals
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based Authentication
IRJET Journal
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
IJNSA Journal
Ko3618101814
Ko3618101814
IJERA Editor
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...
Alexander Decker
Research ppr
Research ppr
Sara Sahu
IRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET Journal
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET Journal
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
IRJET Journal
Jc2516111615
Jc2516111615
IJERA Editor
User Identity Verification Using Mouse Signature
User Identity Verification Using Mouse Signature
IOSR Journals
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
IJERA Editor
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique
cscpconf
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
IRJET Journal
20320130406009
20320130406009
IAEME Publication
Authentication framework using visual cryptography
Authentication framework using visual cryptography
eSAT Publishing House
What's hot
(18)
2 round hybrid password scheme
2 round hybrid password scheme
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based Authentication
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
Ko3618101814
Ko3618101814
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...
Research ppr
Research ppr
IRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
Jc2516111615
Jc2516111615
User Identity Verification Using Mouse Signature
User Identity Verification Using Mouse Signature
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
20320130406009
20320130406009
Authentication framework using visual cryptography
Authentication framework using visual cryptography
Similar to IRJET- A Shoulder-Surfing Resistant Graphical Password System
Graphical Password by Image Segmentation
Graphical Password by Image Segmentation
IRJET Journal
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Password
ijtsrd
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based Authentication
IRJET Journal
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical Password
IOSR Journals
Graphical Password Authentication
Graphical Password Authentication
IRJET Journal
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET Journal
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
IRJET Journal
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
IOSR Journals
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
ijiert bestjournal
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
IJMER
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
IRJET Journal
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password System
IJNSA Journal
IRJET- Implementation of Privacy Preserving Content based Image Retrieval in ...
IRJET- Implementation of Privacy Preserving Content based Image Retrieval in ...
IRJET Journal
Data hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combination
nuruladnan11
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
Kamal Spring
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
IJET - International Journal of Engineering and Techniques
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
IOSR Journals
Survey on Graphical Password by Image Segmentation 2021 2022
Survey on Graphical Password by Image Segmentation 2021 2022
ijtsrd
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
eSAT Publishing House
Similar to IRJET- A Shoulder-Surfing Resistant Graphical Password System
(20)
Graphical Password by Image Segmentation
Graphical Password by Image Segmentation
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Password
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based Authentication
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical Password
Graphical Password Authentication
Graphical Password Authentication
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password System
IRJET- Implementation of Privacy Preserving Content based Image Retrieval in ...
IRJET- Implementation of Privacy Preserving Content based Image Retrieval in ...
Data hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combination
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
Survey on Graphical Password by Image Segmentation 2021 2022
Survey on Graphical Password by Image Segmentation 2021 2022
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
humanexperienceaaa
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
AbhinavSharma374939
Recently uploaded
(20)
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
IRJET- A Shoulder-Surfing Resistant Graphical Password System
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3411 A SHOULDER-SURFING RESISTANT GRAPHICAL PASSWORD SYSTEM Aditya Mishra1, Rahul Jadhav2, Shubham Patil3 1,2,3 Student, B.E., Department of Computer Engineering, Yadavrao Tasgaonkar Institute of Engineering & Technology, Karjat, Maharashtra, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In order to access & help secure the system, Graphical password is an essential credential. Graphical password is a kind of a password which is an alternative mechanism to textual password in order to access the system. It is more secure than the textual password but vulnerable to shoulder-surfing attack. In this project, we have developed a system a system which is resistant against shoulder-surfing attack by using a falsification method. Hence it will confuse the hacker to capture & misuse the password. Key Words: Graphical Password, Registration, Authentication, Shoulder-surfing attack, Falsification. 1. INTRODUCTION Authentication is the first security mechanism that can be used to prevent unauthorized access to the system. In addition, textual password (text-based password) is the most famous authentication mechanism which has been used for several years. In this authentication method, a user selects a combination of characters ashis password,whichis required to memorize by him. However, in order to have a secure password, the generated password must follow several requirements such as minimum 8 characters, a combination of capital and small characters, alphanumeric, using special characters, ... etc. Thus, this makes the password to be complex (e.g. "@bu*%183bDIK), which also makesdifficulties for a hacker to guess(dictionaryattack)or break (brute force attack) it. Similarly, the generated complex password provides this challenge for the users to memorize it for further access. Thus, the users tend to pen down their long and random passwords somewhere or take the easy passwords instead. Graphical password is an alternative authentication password which can solve the problem of remembering the complex passwords in textual password approach. In this case, several images are used to represent a user password, rather than the text. Later on, upon login to the system, a user can select or produce the same graphic image correctly for accessing to the system. Since remembering the image is easier than the text, the selected images as the password is complex as well as easy to remember by the user at the same time. Additionally, the other advantage of graphical password is to preventstealing the passwords if a keystroke logger such as malicious software (Trojan) is installed by a hacker in order tocapture the text-based passwords. In general, there are three graphical password approaches such as recognition-based, pure recall-based and cued recall based. In the recognition- based approach, the user can pick several images such as icons or symbols which he recently selected in user registration step. During the authenticationprocess,theuser is required to recognize their registration choiceamongaset of candidates. In the second approach, pure recall-based,the user must produce his graphical password, which he generated in registration. In this case, unlike the previous approach, the user needs to reproducehispasswordwithout any given reminder such as drawing a particular shape. In contrast, in cued recall-based, several specific locations within an image can be selected as the graphical password. Although the graphical password method is beneficial, but shoulder-surfing attack is the main concerns in this authentication mechanism. Shoulder-surfing attack is referred to capturing the password by direct watching or recording the user's authentication session while selecting or producing the images as the password. In this project, a recognition-based graphical password technique based on the false image which is resistance toshoulder-surfingattack is suggested. In this way, the false image within the authentication step can confuse a hacker who tries to capture the password using shoulder-surfing attack. 2. LITERATURE REVIEW Authentication is the first security mechanism that can be used to prevent unauthorized access to the system. In addition, textual password (text-based password) is the most famous authentication mechanism which has been used for several years. B. Malek, M: Orozco, and A. EI Saddik, "Novel shoulder- surfing resistant haptic-based graphical password," in Proc. Euro Haptics 2006 [2]. I.-S. Wu, M.-L. Lee, H.-Y. Lin, and C.-Y. Wang, "Shoulder-surfing proof graphical password authentication scheme," Internationaljournalofinformation security, vol. 13, pp. 245-254,2014. [3]. Our System Proposal that is Graphical Password overcomes the drawbacks of textual password. Graphical password systems can be classified as either recognition-based, cued recall-based or pure recall-based. Recognition involves identifying whether one has seen an image before. The user must only be able to recognize previously seen images, not generate them unaided from memory. On contrast, pure recall is retrieval without external cues to aid memory. Using recall-based techniques,auserisaskedto reproduce something that he or she created or selected earlier during the registration stage, for example, remembering a textual password that one has not written
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3412 down. Pure recall is a harder memory task than recognition. Between pure recall and pure recognition there isadifferent form of recollection: cued recall. An example of cued recall within graphical password systems is scanning an image to find previously chosen locations in it. Viewing the image cues the user about the locations. This is easier than having to recall something entirely from memory (i.e. free recall), but harder than simply recognizing whether a particular image has been seen before or not (i.e. recognition). 3. EXISTING SYSTEM Like other authentication methods, the graphical password consisted of two steps, registration and authentication. In the registration step, users select some images from different categories or produce a graphical image as his password. Later on, in the authentication step, he needs to select the correct images or re-draw the graphical password which is used by him in the registration step. In the following, these two steps are explained in detail. Fig -1: Class diagram of the process 3.1 REGISTRATION Since registration is the first step, each user needs to input his full name, email address and username. In addition, he requires to select minimum 5 and maximum 8 image categories from giving options. After the information is submitted to the database, selecting graphical password process will start. In this case, a user can select one image from each category per page, depends on the length of his password (minimum 5 and maximum 8 pages) but this selection must be done by typing the alphanumeric character, which is attached to each image. In addition, the alphanumeric characterswhich belongtoeachimageandthe position of images in each category are selected to be randomized. This can make the proposed method to be robust against key logger as well as shoulder surfing attack at the same time. Similarly, selecting one image from each category will be continued till the last category. Hence, a sequence of images as a graphical password will store in the database. The registration flowchart is shown in figure. Fig -2: Registration Flowchart 3.2 AUTHENTICATION In the authentication (login) page, a user needs to provide the correct username first. Afterward, the system will retrieve the image categories which selected by the user in the registration step. Since the processof selectingimagesas a password is similar to the registration step, the user will type the alphanumeric character, which is attached to each image. Fig -3: Authentiation Flowchart 4. PROPOSED SYSTEM Likeexisting system our proposed system alsoconsistoftwo steps that is first is registration and then is authentication.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3413 Fig -4: System Architecture Fig -5: Sequence diagram of the process 4.1 REGISTRATION The registration step is as same which is explained in existing system without any change. That is in registration step users select some images from different categories or produce a graphical image as his password. In which users select images from a category of 5 or 8 image categories from the options. After the information is submitted to the database, selecting graphical password process will start. Fig -6: Typing image from the football (desired) category. 4.2 AUTHENTICATION In our proposed system in order to provide more security to the existing authentication methods, in each page where all imageswithin each category are shown, the false image (not my password) is added automatically. This image can be replaced with one of the images in each category. Since the user is aware of the selected image in each category, if the known image is available, he can pick out the correct image, otherwise, he takes the false image. In order to make the process to be more complex for the attacker, a random category will be added between selected categories. In this example, since the pet category was not selected by the user as part of his password in the registration step, he must select the false image to ignore this category. However, this category can be considered as the real image category by an attacker who watchesthe user authentication process, since the user selected an image from this category. After the graphical password will be validated, then the system will automatically direct the user to the appropriate web page (user profile). To this end, it can prevent shoulder-surfing attack by pretending that the selected image (false image) is one of the images that user selected as his password. Fig -7: Typing false image as a password from random category 5. PROBLEM DEFINITION Graphical passwords introduce us to a whole new form of authentication. The most common form of authentication used today is the used of alphanumeric textsand thisform of authentication hasbeen proven to be prone to severalforms of attacks such as guessing, social engineering, spywares, dictionary attacks, shoulder surfing and even hidden cameras. It can be frustrating to keep up with all the passwordssince it is not a recommended that someone uses one password for more than one account or computer program or device. One of the main problemsgraphical passwordstend tosolve is the problem of a user using a weak password so that he/she won’t forget it and at times when users are encouraged to use strong passwords, they tend to use it for all their accountsand also userskeep theirpasswordswhere
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3414 attackers can access because of the fact that they don’t want to memorize it. Since it is easier to remember pictures than text, graphical passwordstend to enhancesecurityandatthe same time make it easier for the user to use. This report focuses on graphical password authentication and the different forms commonly used today. It also highlights the advantages graphical passwords have over text based passwords and the forms of attack you can be prone to while using graphical passwords. Because of increasing threats to computer systems, there is great need for security requirements. Security practitioners and researchers have made studies in protecting systems, individual users and digital assets. However, the problem arises that, until recently, security was treated wholly as a technical problem, and the system user wasnotfactoredinto the equation. Users interact with securitytechnologieseither passively or actively. For passive use understandability may be sufficient for users. For active use people need much more from their security solutions and usability solutions such as: ease of use, memorability, usability, efficiency, effectiveness and satisfaction. Nowadays there is an increasing recognition that security problems are also fundamentally human-computer interaction issues (Dourish, P 2004 and Patrick et al 2004). Authentication is the processof determining whether a user should be allowed access to a particular system or resource. Conventional passwordsare used widely for authentication, but other methods are also available today, including biometrics and smart cards. However, there are problemsof these alternative technologies. Biometrics raise privacy concerns and smart cards usually need a PIN because cards can be lost. Asa result, passwordsare still dominant and are expectedto continue toremain so for some time as an authentication process (Coventry et al 2003, Jain et al 2000 and Brostoff et al 2000). Conventional passwords have drawbacks from a usability standpoint, and these usability problems tend to translate directly into security problems. That is, users who fail to choose and handle passwords securely open holes that attackers can exploit Brown et al. 2004, Dhamija et al 2000, Feldmeier et al. 1990, Klein et al 1990, Morris et al.1979 and Sasse et al. 2001). The “password problem,” as formulated by Birget (2005), arises because passwords are expected to comply with two conflicting requirements, which is passwords should be usable and ease to remember, and the user authentication protocol should be executable quickly and easily by humans and passwords should be also secure, i.e., they should look random and should be hard to guess; they should be changed frequently, and should be different on different accounts of the same user; they should not be written down or stored in plain text. 6. SECURITY MEASURES Fig -8: Falsification Security is an essential concept to any system being developed. It certainly keeps unauthorized users or else hackers from maliciously exploiting the system. Likewise, in our project we have taken a measure to protect our system. As described earlier we have introduced a method called as falsification to prevent shoulder-surfing attacks. Falsification is nothing but adding a false image in the authentication step in order to confuse the hacker. This image can be replaced with one of the images in each category. Since the user is aware of the selected image in each category, if the known image is available, he can pick out the correct image, otherwise, he takes thefalseimage.In order to make the process to be more complex for the attacker, a random category will be added betweenselected categories. In the above example, since the basketball team category was not selected by the user as part of his password in the registration step, he must select the false image to ignore this category. However, this category can be considered as the real image category by an attacker who watches the user authentication process, since the user selected an image from this category. After that the password will be validated and user will be directed to the desired page. This will prevent shoulder- surfing attack since the false image selected by the user is not the actual password and in turn will confuse the hacker. 7. CONCLUSIONS The graphical password is an alternative authentication system, which can be based on a selection of graphical images as the password to access to the system. It has been developed to make the passwords to be more memorable and secure. In this project, a suggested graphical password method is similar to the Pass Faces approach but it provides this opportunity to remember the images. Since a grid of 9 Please Select your graphical password.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3415 human faces, for example, is used in Pass Faces approach, this may confuse the user to remember the selected facesin the registration step. In contrast, since the user needs to remember his favourite categories such as football team or car and also each image within each category, thesuggested graphical password is simple in term of remembering the images. In addition, this approach can increase the security of the system since the alphabet, the image, as well as the category sequence are randomizing every single time that the user requires to login to the system. Additionally, the alphanumeric character which are located close to each image in 9 grids are typed by user instead of using mouseto select the graphical password. Moreover, a false image can be useful in order to make the authentication to be more complex for the attacker. ACKNOWLEDGEMENT I take the privilege to expressmy sincere thanks to Prof. P.A. Ghonge, Principal, Y.T.I.E.T, Bhivpuri road and Prof. Vaishali Londhe, Head, Department of Computer Engineering, Yadavrav Tasgaonkar College of Engineering, for providing the much-needed support. I wish to express my wholehearted appreciation and deep sense of heartfelt gratitude to my guide Prof. Nilima D. Nikam, Professor, Department of Computer Engineering, Yadavrav Tasgaonkar College of Engineering for his generous help, excellent guidance, lucid suggestions and encouragement throughout the course of this work. His concrete directions and critical viewshavegreatlyhelpedme in successful completion of this work. I am also thankful to all those who helped directly or indirectly in the completion of this work. REFERENCES [1] Andrew Lim Chee Yeung*, Bryan Lee Weng Wai, Cheng Hao Fung, Fiza Mughal, Vahab Iranmanesh* (Department of Computing and Information Systems Faculty of Science and Technology Sunway University Bandar Sunway, Malaysia, 2015). [2] B. Malek, M: Orozco, and A. EI Saddik, "Novel shoulder- surfing resistant haptic-based graphical password," in Proc. Euro Haptics 2006. [3] I.-S. Wu, M.-L. Lee, H.-Y. Lin, and C.-Y. Wang, "Shoulder- surfing proof graphical password authentication scheme," International journal of information security, vol. 13, pp. 245-254,2014. [4] N. H. Zakaria, D. Griffiths, S. Brostoff, and J. Yan, "Shoulder surfing defence for recall-based graphical passwords," in Proceedings of the Seventh Symposium on Usable Privacy and Security, 2011, p. 6. [5] S. Wiedenbeck, J. Waters, L. Sobrado, and J.-c. Birget, "Design and evaluation of a shoulder-surfing resistant graphical password scheme," In Proceedings of the working conference on Advanced visual interfaces, 2006, pp. 177-184.
Download now