SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 6 Issue 3, March-April 2022 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD49837 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1967
Survey on Graphical Password by Image Segmentation 2021-2022
Eshita Agrawal1
, Dr. Vijaykumar A2
1
Department of MCA, Jain (Deemed-to-be University), Bangalore, Karnataka, India
2
Professor, Jain (Deemed-to-be University), Bangalore, Karnataka, India
ABSTRACT
The most common computer authentication method is using
alphanumeric usernames and passwords. It has been shown that this
method has significant disadvantages. For example, users tend to
choose passwords that are easy to guess. On the other hand, when a
password is hard to guess, it's often hard to remember. To address
this problem, some researchers have developed authentication
methods that use images as passwords. In this article, Ihave provided
a comprehensive overview of existing graphical password
techniques. These techniques fell into two categories: recognition-
based and memory-based approaches. I will discuss the strengths and
limitations of each method and point out future research directions in
this area. I will also try to answer two important questions: "Are
graphical passwords as secure as text-based passwords?"; "What are
the main problems in the design and implementation of graphical
passwords?" This survey is useful for information security
researchers and professionals interested in finding an alternative to
text-based authentication methods.
KEYWORDS: recognition-based approach, memory-based
approaches
How to cite this paper: Eshita Agrawal |
Dr. Vijaykumar A "Survey on Graphical
Password by Image Segmentation 2021-
2022" Published in
International Journal
of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-6 |
Issue-3, April 2022,
pp.1967-1971, URL:
www.ijtsrd.com/papers/ijtsrd49837.pdf
Copyright © 2022 by author (s) and
International Journal of Trend in
Scientific Research and Development
Journal. This is an
Open Access article
distributed under the
terms of the Creative Commons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
1. INTRODUCTION
The different kinds of passwords used today are
mainly based on recognition and recall, just to name a
few. In recall based, someone is needed to regenerate
the password, he keep at the time of registration
method. The disadvantage during this process is that
it depends on recall of password and if the user does
an error the authentication is denied.
In the recall-based process, chances are somebody
will replicate equivalent projected password "Draw a
Secret" in which users are asked to draw some text or
shape on a grid.
On the opposite side, the recognition based technique,
a group of pictures that consists of a set of pass
images is given to the user which they are asked to
acknowledge and determine their pass image was
chosen at the time of registration.
The other technique of user access is that user should
choose a low resolution image that was preserved
earlier. This was projected by Hayashi, et al. The oil
painting filter helps in decreasing the standard of the
original image which was chosen by the user
throughout the initial registration phase. This process
is most helpful within the device with a decent color
display.
'Deja vu' is another visual image technique that was
introduced by Dhamaija and Perrig. During this
method, user is given some random pc generated
pictures and the user must choose the pass image.
Throughout the authentication, the user has to select a
similar pre-registered image to prove his identity.
In general, images of nature and animals are
memorized easier than computer graphic images.
Memory of the nature needs additional storage.
However, Secure and usable graphical password is
desired.
PROPOSED SYSTEM
The paper proposes a method that lets in user to enter
an image as a password and only the user knows what
the image looks like as a whole. Upon receiving the
image, the system segments it into a series of images
and stores them accordingly. When the user next logs
into the system, he will receive the segmented image
in encrypted order. If the user now selects the parts of
the image in an order to create the original image they
IJTSRD49837
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49837 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1968
submitted, the user is considered authentic. Otherwise
the user will not get access.
The system uses image segmentation based on
coordinates. The coordinates of the segmented image
allow the system to fragment the image and store it in
different parts. In effect, the system segments the
image into a grid and stores each part in appropriate
order but when logging in, the picture shows broken
and messed up. At this point, only the user who
provided the image knows what the actual image
looks like and must move the pieces horizontally
from left to right, one row at a time, according to the
order the pieces were placed on the page place image.
So, after a successful attempt, the user is granted
access.
Modules and their Description
The system comprises of 5 Modules:
1. Image Submission
2. Image Fragmentation
3. Image parts storage
4. Part Jumbling
5. Authentication
Description:-
1. Image Submission
User can submit an image.
2. Image Fragmentation
System then fragments/divides the image into an
8x8 grid.
3. Image parts storage
The image parts are separated and stored
accordingly.
4. Part Jumbling
The parts are then provides to user in a jumbled
order.
5. Authentication
After selecting the parts in order of original
image, a successful authentication is done else
not.
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49837 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1969
2. Recognition Based Techniques
Dhamija and Perrig proposed a graphical
authentication scheme based on the hash visualization
technique. In their system, the user is asked to choose
a certain number of images from a series of random
images generated by a program. Later, the user is
prompted to identify the preselected images to be
authenticated. The results showed that 90% of all
participants were able to authenticate using this
technique, while only 70% were successful with text-
based passwords and PINs. However, the average
login time is longer than the traditional approach. A
weakness of this system is that the server must store
the seeds of each user's portfolio pictures in plain
text. In addition, the process of selecting a set of
images from the image database can be lengthy.
Sobrado and Birget developed a graphical password
technique that addresses the problem of shoulder
navigation. In the first scheme, the system displays a
number of access objects (preselected by the user)
among many other objects. For authentication, the
user must recognize the access objects and click
inside the convex hull formed by all the pass objects.
To make the password difficult to guess, Sobrado and
Birget suggested using 1000 objects, which makes the
screen very crowded and the objects almost
indistinguishable, but using fewer objects can result
in a smaller password space because the resulting
convex helmet is large can be. In your second
algorithm, a user moves a box (and the objects it
contains) until the step object in the box aligns with
the other two step objects. The authors also suggest
repeating the process a few more times to minimize
the chances of accidentally clicking or spinning to
sign you up. The main disadvantage of these
algorithms is that the login process can be slow.
2.1. Recall Based Techniques
Another shoulder-surfing resistant technique has been
proposed. During this technique, a user selects variety
of images as pass-objects. Every pass-object has
many variants and every variant is allotted a singular
code. Throughout authentication, the user is
challenged with several scenes. Every scene contains
several pass-objects (each within the variety of a
randomly chosen variant) and plenty of decoy-
objects. The user should type in a string with the
unique codes such as the pass-object variants present
in the scene in addition as a code indicating the
relative location of the pass-objects in regard to a pair
of eyes. The argument is that it's terribly laborious to
crack this sort of secret though the entire
authentication method is recorded on video as a result
of there's no click to grant away the pass-object
information. However, this methodology still needs
users to learn the alphanumerical code for everypass-
object variant .Later extended this approach to allow
the user to assign their own codes to pass-object
variants. However, this method still forces the user to
memorize many text strings and thus suffer from the
numerous drawbacks of text-based passwords.
3. LITERATURE REVIEW
Are graphical passwords are secure as text based
passwords?
Very little research has been done to examine the
difficulty of cracking graphical passwords. Since
graphics passwords are not widely used in practice,
there are no reports of actual cases of graphics
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49837 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1970
password cracking. Here we briefly examine some of
the possible techniques for cracking graphical
passwords and try to make a comparison with text-
based passwords.
Brute force attack
The most important protection against brute force
searches is a sufficiently large password space. Text-
based passwords have a password spacing of 94^N,
where N is the length of the password and 94 is the
number of printable characters without SPACE. Some
graphical password techniques have been shown to
provide a similar or larger password space than text-
based passwords. Passwords based on graphical
recognition tend to have smaller password gaps than
recovery-based methods. Graphic passwords are more
difficult to enforce than text-based passwords. Attack
programs must automatically generate precise mouse
movements to mimic human input, which is
particularly difficult in graphical password recovery.
In general, we believe that a graphical password is
less susceptible to brute force attacks than a text-
based password.
Dictionary Attack
Since recognition based mostly graphical passwords
involve mouse input rather than keyboard input, it'll
be impractical to hold out dictionary attacks against
this sort of graphical passwords. For a few recall
based graphical passwords, it's doable to use a
dictionary attack however an automatic dictionary
attack are going to be rather more advanced than a
text based dictionary attack a lot of analysis is
required during this area. Overall, I believe graphical
passwords are less liable to dictionary attacks than
text-based passwords.
Guessing
Unfortunately, it seems that graphical passwords are
usually sure, a significant downside typically related
to text-based passwords. For example, studies on the
passface technique have shown that folks often opt
for weak and predictable graphical passwords. Nali
and Thorpe' study found similar certainty for
graphical passwords created victimization the DAS
technique. More analysis efforts are required to grasp
the character of graphical passwords created by real
users.
Spyware
With few exceptions, keylogging or keylistening
spyware cannot be used to crack graphical passwords.
It is not clear whether "mouse tracking" spyware will
be an effective tool against graphical passwords.
However, just moving the mouse is not enough to
crack graphical passwords. The information must be
correlated with application information such as
window position and size and timing information.
Shoulder surfing
Like text primarily based passwords, most of the
graphical passwords are prone to shoulder surfing. At
this point, solely a couple of recognition-based
techniques are designed to resist shoulder-surfing.
None of the recall-based techniques are thought of
shoulder-surfing resistant.
Social engineering
Compared to text-based passwords, it is less
convenient for a user to share graphical passwords
with someone else. For example, it is very difficult to
give graphic passwords over the phone. Setting up a
phishing website to retrieve graphical passwords
would be more time consuming.
Overall, I think it's harder to break graphical
passwords exploitation the traditional attack ways like
brute force search, dictionary attack, and spyware.
There's a requirement for a lot of in-depth analysis
that investigates potential attack methods against
graphical passwords.
What are the main problems in the design and
implementation of graphical passwords?
Security
In the previous section, I have briefly examined the
security problems with graphical passwords.
Usability
One of the most complaints among users of
graphical passwords is that the password
registration and login method takes too long,
particularly with detection-based approaches. For
example, throughout the registration phase, a user
must choose pictures from an oversized set of
choices. Throughout the authentication phase, a
user has to scan several images to spot some
passwords. Users might feel that this process is
long and tedious. For this reason, and conjointly as
a result most users aren't acquainted with graphical
passwords, they typically find graphical passwords
less convenient than text-based ones.
Reliability
The main design issue with recall-based methods is
that the responsibleness and accuracy of recognizing
user input. During this sort of method, error
tolerances should be set carefully: too high tolerances
will cause several false positives, whereas too low
tolerances can lead to many negative errors. The
additional fault-tolerant the program is, the more
vulnerable it's to attacks.
Storage and communication
Graphical passwords need rather more space for
storing than primarily text based passwords. Tens
of thousands of images might need to be
maintained in a very centralized database. Network
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49837 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1971
transfer delay is additionally a concern for
graphical passwords, particularly for recognition-
based techniques within which an outsized range of
pictures may have to be displayed for every round
of verification.
4. CONCLUSION
Throughout this paper, I have conducted a
comprehensive survey of existing graphical password
techniques. The present graphical password
techniques might even be classified into two
categories: recognition-based and recall-based
techniques.
In conclusion, this study of Image segmentation
shows its pros and cons. Without any difficulty
Graphical password users might be able to create a
valid password; however they might need to shell
out more storage area than alphanumeric users,
taking more trails and time. An interesting thing
with the usage of Image Segmentation is that it
consists both conflicting necessities is that it is
simple to bear in mind and hard to guess.
Preliminary study suggests that it's tougher to
interrupt graphical passwords using the standard
attack methods like brute force search, dictionary
attack, or spyware. However, since there's not any
wide usage of graphical password systems, the
vulnerabilities of graphical passwords are still not
totally understood.
In future it has great scope. Security of this system
can be increased by increasing the number of levels
used, the number of tolerance squares used.
Challenge response interaction can be added-
In challenge response interactions, server will
present a challenge to the client and the client need
to give response according to the condition given.
If the response is correct then access is granted.
Adding limitation on number of attempts-
Limit the number a user can enter the wrong
password.
REFERENCES
[1] A Balamurali, M V R Harsha, V Sai Hitesh, A
Sai Chaitanya ”Graphical Password by Image
Segmentation” International Journal of
Innovative Technology and Exploring
Engineering (IJITEE) ISSN: 2278-3075,
Volume-8, Issue-6S4, April 2019
[2] Xiaoyuan Suo Ying Zhu G. Scott. Owen
“Graphical Passwords: A Survey” 21st Annual
Computer Security Applications Conference
(ACSAC 2005), 5-9 December 2005, Tucson,
AZ, USA.
[3] Rohitkumar Kolay, Animesh Vora,
Vinaykumar Yadav “Graphical Password
Authentication Using Image Segmentation”
International Research Journal of Engineering
and Technology (IRJET)
[4] Maw Maw Naing | Ohnmar Win "Graphical
Password Authentication using image
Segmentation for Web Based Applications"
Published in International Journal of Trend in
Scientific Research and Development (ijtsrd),
ISSN: 2456-6470, Volume-3 | Issue-4, June
2019
[5] http://searchsecurity.techtarget.com/definition/g
raphical-password
[6] http://www.google.co.in/url?sa=t&rct=j&q=&e
src=s&source=web&cd=8&ved=0CEsQFjAH&
url=http%3A%2F%2Fclam.rutgers.edu%2F~bi
rget%2FgrPssw%2Fsusan3.pdf&ei=_HPdUsH5
CI7xrQe87IEo&usg=AFQjCNGUZJ80lCOHxp
2_W_KeAq2a-
pGF3w&bvm=bv.59568121,d.bmk
[7] Blonder, G. 1996. Graphical Passwords. United
States Patent5559961.
[8] Wiedenbeck, S., Waters, J., Birget, J. C.,
Brodskiy, A., and Memon, N. 2005.
Authentication using graphical passwords:
Effects of tolerance and image choice. In Proc.
Symp. On Usable Privacy and Security
(SOUPS’05).
[9] Chiasson, S., van Oorschot, P. C., and Biddle,
R. 2007. A second look at the usability of click-
based graphical passwords. In Proc. Symp. on
Usable Privacy and Security(SOUPS’07).
[10] Dirik, A., Menon, N., and Birget, J. 2007.
Modeling user choice in the Pass Points
graphical password scheme. In Proc. Symp. on
Usable Privacy and Security (SOUPS’07).

More Related Content

Similar to Survey on Graphical Password by Image Segmentation 2021 2022

IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System             IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System IRJET Journal
 
Data hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combinationData hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combinationnuruladnan11
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...IJCSIS Research Publications
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsIJMER
 
IRJET- Image Privacy Protection as a Single Share
IRJET-  	  Image Privacy Protection as a Single ShareIRJET-  	  Image Privacy Protection as a Single Share
IRJET- Image Privacy Protection as a Single ShareIRJET Journal
 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Schemepaperpublications3
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET Journal
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationIRJET Journal
 
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMFACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMIRJET Journal
 
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMFACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMIRJET Journal
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET Journal
 
Human pose detection using machine learning by Grandel
Human pose detection using machine learning by GrandelHuman pose detection using machine learning by Grandel
Human pose detection using machine learning by GrandelGrandelDsouza
 
IRJET - Human Pose Detection using Deep Learning
IRJET - Human Pose Detection using Deep LearningIRJET - Human Pose Detection using Deep Learning
IRJET - Human Pose Detection using Deep LearningIRJET Journal
 
Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...ijtsrd
 
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTFingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTIRJET Journal
 
Helmet Detection Using Yolo V3 Technique
Helmet Detection Using Yolo V3 TechniqueHelmet Detection Using Yolo V3 Technique
Helmet Detection Using Yolo V3 Techniqueijtsrd
 
Application To Monitor And Manage People In Crowded Places Using Neural Networks
Application To Monitor And Manage People In Crowded Places Using Neural NetworksApplication To Monitor And Manage People In Crowded Places Using Neural Networks
Application To Monitor And Manage People In Crowded Places Using Neural NetworksIJSRED
 
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYSECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYIRJET Journal
 
Face Recognition based Smart Attendance System Using IoT
Face Recognition based Smart Attendance System Using IoTFace Recognition based Smart Attendance System Using IoT
Face Recognition based Smart Attendance System Using IoTIRJET Journal
 

Similar to Survey on Graphical Password by Image Segmentation 2021 2022 (20)

IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System             IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
 
Data hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combinationData hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combination
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
 
IRJET- Image Privacy Protection as a Single Share
IRJET-  	  Image Privacy Protection as a Single ShareIRJET-  	  Image Privacy Protection as a Single Share
IRJET- Image Privacy Protection as a Single Share
 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Scheme
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMFACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEM
 
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMFACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEM
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
 
Human pose detection using machine learning by Grandel
Human pose detection using machine learning by GrandelHuman pose detection using machine learning by Grandel
Human pose detection using machine learning by Grandel
 
IRJET - Human Pose Detection using Deep Learning
IRJET - Human Pose Detection using Deep LearningIRJET - Human Pose Detection using Deep Learning
IRJET - Human Pose Detection using Deep Learning
 
Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...
 
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTFingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOT
 
Helmet Detection Using Yolo V3 Technique
Helmet Detection Using Yolo V3 TechniqueHelmet Detection Using Yolo V3 Technique
Helmet Detection Using Yolo V3 Technique
 
Application To Monitor And Manage People In Crowded Places Using Neural Networks
Application To Monitor And Manage People In Crowded Places Using Neural NetworksApplication To Monitor And Manage People In Crowded Places Using Neural Networks
Application To Monitor And Manage People In Crowded Places Using Neural Networks
 
Ko3618101814
Ko3618101814Ko3618101814
Ko3618101814
 
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYSECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
 
Face Recognition based Smart Attendance System Using IoT
Face Recognition based Smart Attendance System Using IoTFace Recognition based Smart Attendance System Using IoT
Face Recognition based Smart Attendance System Using IoT
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 

Recently uploaded (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 

Survey on Graphical Password by Image Segmentation 2021 2022

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 6 Issue 3, March-April 2022 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD49837 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1967 Survey on Graphical Password by Image Segmentation 2021-2022 Eshita Agrawal1 , Dr. Vijaykumar A2 1 Department of MCA, Jain (Deemed-to-be University), Bangalore, Karnataka, India 2 Professor, Jain (Deemed-to-be University), Bangalore, Karnataka, India ABSTRACT The most common computer authentication method is using alphanumeric usernames and passwords. It has been shown that this method has significant disadvantages. For example, users tend to choose passwords that are easy to guess. On the other hand, when a password is hard to guess, it's often hard to remember. To address this problem, some researchers have developed authentication methods that use images as passwords. In this article, Ihave provided a comprehensive overview of existing graphical password techniques. These techniques fell into two categories: recognition- based and memory-based approaches. I will discuss the strengths and limitations of each method and point out future research directions in this area. I will also try to answer two important questions: "Are graphical passwords as secure as text-based passwords?"; "What are the main problems in the design and implementation of graphical passwords?" This survey is useful for information security researchers and professionals interested in finding an alternative to text-based authentication methods. KEYWORDS: recognition-based approach, memory-based approaches How to cite this paper: Eshita Agrawal | Dr. Vijaykumar A "Survey on Graphical Password by Image Segmentation 2021- 2022" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-6 | Issue-3, April 2022, pp.1967-1971, URL: www.ijtsrd.com/papers/ijtsrd49837.pdf Copyright © 2022 by author (s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) 1. INTRODUCTION The different kinds of passwords used today are mainly based on recognition and recall, just to name a few. In recall based, someone is needed to regenerate the password, he keep at the time of registration method. The disadvantage during this process is that it depends on recall of password and if the user does an error the authentication is denied. In the recall-based process, chances are somebody will replicate equivalent projected password "Draw a Secret" in which users are asked to draw some text or shape on a grid. On the opposite side, the recognition based technique, a group of pictures that consists of a set of pass images is given to the user which they are asked to acknowledge and determine their pass image was chosen at the time of registration. The other technique of user access is that user should choose a low resolution image that was preserved earlier. This was projected by Hayashi, et al. The oil painting filter helps in decreasing the standard of the original image which was chosen by the user throughout the initial registration phase. This process is most helpful within the device with a decent color display. 'Deja vu' is another visual image technique that was introduced by Dhamaija and Perrig. During this method, user is given some random pc generated pictures and the user must choose the pass image. Throughout the authentication, the user has to select a similar pre-registered image to prove his identity. In general, images of nature and animals are memorized easier than computer graphic images. Memory of the nature needs additional storage. However, Secure and usable graphical password is desired. PROPOSED SYSTEM The paper proposes a method that lets in user to enter an image as a password and only the user knows what the image looks like as a whole. Upon receiving the image, the system segments it into a series of images and stores them accordingly. When the user next logs into the system, he will receive the segmented image in encrypted order. If the user now selects the parts of the image in an order to create the original image they IJTSRD49837
  • 2. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD49837 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1968 submitted, the user is considered authentic. Otherwise the user will not get access. The system uses image segmentation based on coordinates. The coordinates of the segmented image allow the system to fragment the image and store it in different parts. In effect, the system segments the image into a grid and stores each part in appropriate order but when logging in, the picture shows broken and messed up. At this point, only the user who provided the image knows what the actual image looks like and must move the pieces horizontally from left to right, one row at a time, according to the order the pieces were placed on the page place image. So, after a successful attempt, the user is granted access. Modules and their Description The system comprises of 5 Modules: 1. Image Submission 2. Image Fragmentation 3. Image parts storage 4. Part Jumbling 5. Authentication Description:- 1. Image Submission User can submit an image. 2. Image Fragmentation System then fragments/divides the image into an 8x8 grid. 3. Image parts storage The image parts are separated and stored accordingly. 4. Part Jumbling The parts are then provides to user in a jumbled order. 5. Authentication After selecting the parts in order of original image, a successful authentication is done else not.
  • 3. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD49837 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1969 2. Recognition Based Techniques Dhamija and Perrig proposed a graphical authentication scheme based on the hash visualization technique. In their system, the user is asked to choose a certain number of images from a series of random images generated by a program. Later, the user is prompted to identify the preselected images to be authenticated. The results showed that 90% of all participants were able to authenticate using this technique, while only 70% were successful with text- based passwords and PINs. However, the average login time is longer than the traditional approach. A weakness of this system is that the server must store the seeds of each user's portfolio pictures in plain text. In addition, the process of selecting a set of images from the image database can be lengthy. Sobrado and Birget developed a graphical password technique that addresses the problem of shoulder navigation. In the first scheme, the system displays a number of access objects (preselected by the user) among many other objects. For authentication, the user must recognize the access objects and click inside the convex hull formed by all the pass objects. To make the password difficult to guess, Sobrado and Birget suggested using 1000 objects, which makes the screen very crowded and the objects almost indistinguishable, but using fewer objects can result in a smaller password space because the resulting convex helmet is large can be. In your second algorithm, a user moves a box (and the objects it contains) until the step object in the box aligns with the other two step objects. The authors also suggest repeating the process a few more times to minimize the chances of accidentally clicking or spinning to sign you up. The main disadvantage of these algorithms is that the login process can be slow. 2.1. Recall Based Techniques Another shoulder-surfing resistant technique has been proposed. During this technique, a user selects variety of images as pass-objects. Every pass-object has many variants and every variant is allotted a singular code. Throughout authentication, the user is challenged with several scenes. Every scene contains several pass-objects (each within the variety of a randomly chosen variant) and plenty of decoy- objects. The user should type in a string with the unique codes such as the pass-object variants present in the scene in addition as a code indicating the relative location of the pass-objects in regard to a pair of eyes. The argument is that it's terribly laborious to crack this sort of secret though the entire authentication method is recorded on video as a result of there's no click to grant away the pass-object information. However, this methodology still needs users to learn the alphanumerical code for everypass- object variant .Later extended this approach to allow the user to assign their own codes to pass-object variants. However, this method still forces the user to memorize many text strings and thus suffer from the numerous drawbacks of text-based passwords. 3. LITERATURE REVIEW Are graphical passwords are secure as text based passwords? Very little research has been done to examine the difficulty of cracking graphical passwords. Since graphics passwords are not widely used in practice, there are no reports of actual cases of graphics
  • 4. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD49837 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1970 password cracking. Here we briefly examine some of the possible techniques for cracking graphical passwords and try to make a comparison with text- based passwords. Brute force attack The most important protection against brute force searches is a sufficiently large password space. Text- based passwords have a password spacing of 94^N, where N is the length of the password and 94 is the number of printable characters without SPACE. Some graphical password techniques have been shown to provide a similar or larger password space than text- based passwords. Passwords based on graphical recognition tend to have smaller password gaps than recovery-based methods. Graphic passwords are more difficult to enforce than text-based passwords. Attack programs must automatically generate precise mouse movements to mimic human input, which is particularly difficult in graphical password recovery. In general, we believe that a graphical password is less susceptible to brute force attacks than a text- based password. Dictionary Attack Since recognition based mostly graphical passwords involve mouse input rather than keyboard input, it'll be impractical to hold out dictionary attacks against this sort of graphical passwords. For a few recall based graphical passwords, it's doable to use a dictionary attack however an automatic dictionary attack are going to be rather more advanced than a text based dictionary attack a lot of analysis is required during this area. Overall, I believe graphical passwords are less liable to dictionary attacks than text-based passwords. Guessing Unfortunately, it seems that graphical passwords are usually sure, a significant downside typically related to text-based passwords. For example, studies on the passface technique have shown that folks often opt for weak and predictable graphical passwords. Nali and Thorpe' study found similar certainty for graphical passwords created victimization the DAS technique. More analysis efforts are required to grasp the character of graphical passwords created by real users. Spyware With few exceptions, keylogging or keylistening spyware cannot be used to crack graphical passwords. It is not clear whether "mouse tracking" spyware will be an effective tool against graphical passwords. However, just moving the mouse is not enough to crack graphical passwords. The information must be correlated with application information such as window position and size and timing information. Shoulder surfing Like text primarily based passwords, most of the graphical passwords are prone to shoulder surfing. At this point, solely a couple of recognition-based techniques are designed to resist shoulder-surfing. None of the recall-based techniques are thought of shoulder-surfing resistant. Social engineering Compared to text-based passwords, it is less convenient for a user to share graphical passwords with someone else. For example, it is very difficult to give graphic passwords over the phone. Setting up a phishing website to retrieve graphical passwords would be more time consuming. Overall, I think it's harder to break graphical passwords exploitation the traditional attack ways like brute force search, dictionary attack, and spyware. There's a requirement for a lot of in-depth analysis that investigates potential attack methods against graphical passwords. What are the main problems in the design and implementation of graphical passwords? Security In the previous section, I have briefly examined the security problems with graphical passwords. Usability One of the most complaints among users of graphical passwords is that the password registration and login method takes too long, particularly with detection-based approaches. For example, throughout the registration phase, a user must choose pictures from an oversized set of choices. Throughout the authentication phase, a user has to scan several images to spot some passwords. Users might feel that this process is long and tedious. For this reason, and conjointly as a result most users aren't acquainted with graphical passwords, they typically find graphical passwords less convenient than text-based ones. Reliability The main design issue with recall-based methods is that the responsibleness and accuracy of recognizing user input. During this sort of method, error tolerances should be set carefully: too high tolerances will cause several false positives, whereas too low tolerances can lead to many negative errors. The additional fault-tolerant the program is, the more vulnerable it's to attacks. Storage and communication Graphical passwords need rather more space for storing than primarily text based passwords. Tens of thousands of images might need to be maintained in a very centralized database. Network
  • 5. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD49837 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1971 transfer delay is additionally a concern for graphical passwords, particularly for recognition- based techniques within which an outsized range of pictures may have to be displayed for every round of verification. 4. CONCLUSION Throughout this paper, I have conducted a comprehensive survey of existing graphical password techniques. The present graphical password techniques might even be classified into two categories: recognition-based and recall-based techniques. In conclusion, this study of Image segmentation shows its pros and cons. Without any difficulty Graphical password users might be able to create a valid password; however they might need to shell out more storage area than alphanumeric users, taking more trails and time. An interesting thing with the usage of Image Segmentation is that it consists both conflicting necessities is that it is simple to bear in mind and hard to guess. Preliminary study suggests that it's tougher to interrupt graphical passwords using the standard attack methods like brute force search, dictionary attack, or spyware. However, since there's not any wide usage of graphical password systems, the vulnerabilities of graphical passwords are still not totally understood. In future it has great scope. Security of this system can be increased by increasing the number of levels used, the number of tolerance squares used. Challenge response interaction can be added- In challenge response interactions, server will present a challenge to the client and the client need to give response according to the condition given. If the response is correct then access is granted. Adding limitation on number of attempts- Limit the number a user can enter the wrong password. REFERENCES [1] A Balamurali, M V R Harsha, V Sai Hitesh, A Sai Chaitanya ”Graphical Password by Image Segmentation” International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8, Issue-6S4, April 2019 [2] Xiaoyuan Suo Ying Zhu G. Scott. Owen “Graphical Passwords: A Survey” 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA. [3] Rohitkumar Kolay, Animesh Vora, Vinaykumar Yadav “Graphical Password Authentication Using Image Segmentation” International Research Journal of Engineering and Technology (IRJET) [4] Maw Maw Naing | Ohnmar Win "Graphical Password Authentication using image Segmentation for Web Based Applications" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4, June 2019 [5] http://searchsecurity.techtarget.com/definition/g raphical-password [6] http://www.google.co.in/url?sa=t&rct=j&q=&e src=s&source=web&cd=8&ved=0CEsQFjAH& url=http%3A%2F%2Fclam.rutgers.edu%2F~bi rget%2FgrPssw%2Fsusan3.pdf&ei=_HPdUsH5 CI7xrQe87IEo&usg=AFQjCNGUZJ80lCOHxp 2_W_KeAq2a- pGF3w&bvm=bv.59568121,d.bmk [7] Blonder, G. 1996. Graphical Passwords. United States Patent5559961. [8] Wiedenbeck, S., Waters, J., Birget, J. C., Brodskiy, A., and Memon, N. 2005. Authentication using graphical passwords: Effects of tolerance and image choice. In Proc. Symp. On Usable Privacy and Security (SOUPS’05). [9] Chiasson, S., van Oorschot, P. C., and Biddle, R. 2007. A second look at the usability of click- based graphical passwords. In Proc. Symp. on Usable Privacy and Security(SOUPS’07). [10] Dirik, A., Menon, N., and Birget, J. 2007. Modeling user choice in the Pass Points graphical password scheme. In Proc. Symp. on Usable Privacy and Security (SOUPS’07).