63 research outputs found

    Graphical Password Authentication using Cued Click Points

    Get PDF
    Abstract With the rapid use of computers, the security of passwords is must where privacy is important. Fo

    Digital Identity on Internet

    Get PDF
    Security is an important issue in accessing various applications because of increasing threats in computer systems. There are various password schemes or graphical password software in market. An important goal for any authentication systems is to support use rs in selecting passwords of higher security. The concept of usable security aims at enhancing the authentication process by expanding the effective password space. The aim is to develop an application for digital identity using two level authentication techniques i.e. Username and Password followed by Graphical Password (Cued click point) to make it more secure

    Secure Authentication Using Click Draw Based Graphical Password Scheme

    Full text link
    Graphical passwords are an alternative to alphanumeric passwords in which users click on images to authenticate themselves rather than type alphanumeric strings. We have developed one such system, called Secure Authentication using Click Draw Based graphical password scheme, and evaluated it with human users. Secure Authentication using Click Draw Based graphical password scheme, including USAbility and security evaluations, and implementation considerations. An important USAbility goal for knowledge-based authentication systems is to support users in selecting passwords of higher security, in the sense of being from an expanded effective security pace. We use the sequence of multiple images along with a dummy image and alsoa pattern on any single image to influence user choice in click draw based graphical passwords, encouraging users to select more random, and hence more difficult to guess patterns

    A Novel method for user authentication by CaRP And Login History

    Get PDF
    Cyber security is the main challenge nowadays. Many authentication techniques are available for these, for unwanted access for more secure data is prohibited. Graphical and text password are used for user authentication process. Sometimes text passwords are not secured and graphical password are more secure but vulnerable to shoulders surfing attack. The click event on various points for user friend-lines and protection from various security attacks. In system, login history image file combined CaRP for user authentication to enhancing the more security level primitives .The image file contain details of login and logout for date, time all related information. The file is encrypted by DES algorithm and send that file on mail. It is higher security primitives for the user. online guessing attack, relay attacks and if combined with dual technology for shoulder surfing attack are new concepts are available. DOI: 10.17762/ijritcc2321-8169.15075

    Authentication for the System by using Graphical Region and Alphanumeric Password

    Get PDF
    Security in the computer is largely supported by the passwords for authentication process. The common computer authentication method is to use alphanumerical usernames and passwords. However, users have complexity remembering a password that is long and random appearing. Instead, they create short, simple, and insecure passwords. Graphical passwords have been designed to try to make passwords more memorable and easier for people to use and more secure. The graphical password provides a promising alternative to traditional alphanumeric passwords. In this paper, graphical passwords have been introduced as an alternative to authentication schemes. Though the graphical password scheme helps in generating more user friendly passwords, they are still weak to shoulder surfing. To address this issue, text along with image can be combined to generate more secure password. In this paper we developed a design of graphical region and alphanumeric password system as to click on image along with text and select the region rather than type only alphanumeric characters. DOI: 10.17762/ijritcc2321-8169.15050

    CCBS – a method to maintain memorability, accuracy of password submission and the effective password space in click-based visual passwords

    Get PDF
    Text passwords are vulnerable to many security attacks due to a number of reasons such as the insecure practices of end users who select weak passwords to maintain their long term memory. As such, visual password (VP) solutions were developed to maintain the security and usability of user authentication in collaborative systems. This paper focuses on the challenges facing click-based visual password systems and proposes a novel method in response to them. For instance, Hotspots reveal a serious vulnerability. They occur because users are attracted to specific parts of an image and neglect other areas. Undertaking image analysis to identify these high probability areas can assist dictionary attacks. Another concern is that click-based systems do not guide users towards the correct click-point they are aiming to select. For instance, users might recall the correct spot or area but still fail to include their click within the tolerance distance around the original click-point which results in more incorrect password submissions. Nevertheless, the Passpoints study by Wiedenbeck et al., 2005 inspected the retention of their VP in comparison with text passwords over the long term. Despite being cued-recall the successful rate of their VP submission was not superior to text passwords as it decreased from 85% (the instant retention on the day of registration) to 55% after 2 weeks. This result was identical to that of the text password in the same experiment. The successful submission rates after 6 weeks were also 55% for both VP and text passwords. This paper addresses these issues, and then presents a novel method (CCBS) as a usable solution supported by an empirical proof. A user study is conducted and the results are evaluated against a comparative study

    Login History and CaRP for User Authentication

    Get PDF
    Password is main vulnerability in computer security. Passwords are commonly guessed by machine programs running dictionary attacks. Passwords main used for the authentication method in spite of security weaknesses. User authentication obviously practical issue. According to the view of a service provider this problem needs to be resolved within real-world constraints such as the available hardware and software infrastructures. According to user’s view user friendliness is a basic requirement Click based graphical password scheme provides a different approach to address the familiar image hotspot problem. Graphical password systems such as PassPoints, that frequently leads to weak password choices. So to provide user friend-liness and also the protection from various security attacks. In this, graphical password scheme, the click event is performed on various points on same or different images. DOI: 10.17762/ijritcc2321-8169.15064

    Authentication System Using Text and 3D Image Password

    Get PDF
    The purpose of this paper is increasing the safety house and avoiding the weakness of typical word. pc world surroundings authentication plays a vital role for word. User authentication is one amongst the foremost vital procedures needed to access secure and confidential information. Authentication of users is sometimes achieved through text-based passwords. Therefore researchers of recent days have gone for different strategies wherever in graphical image square measure used as a word. Image based mostly authentication permits user to form graphical word that has benefits over text-based passwords. Graphical passwords are designed to form passwords a lot of unforgettable and easier for folks to use. Persuasive Technology is employed to guide user’s alternative in click-based graphical passwords, exalting users to pick out a lot of random and therefore harder to guess click-points. during this paper, we've modified the method of clicking on the photographs and to form the word safer Advanced secret writing normal (AES) technique is employed so authentication are often come safer and word will be generated, attested & protected simply. This Paper is enhance the safety, a user has got to decide a sequence for the photographs used throughout registration. DOI: 10.17762/ijritcc2321-8169.150611

    Securing Web Accounts Using Graphical Password Authentication through MD5 Algorithm

    Get PDF
    Today, most Internet applications still uses traditional text based passwords for the authentication. Two conflict cases of traditional password i.e. if user choose simple password it will easy to guess by attacker. The other hand, if a password is strong then it is often hard to remember for user. Instead of a text password user will be choose graphical password scheme that uses MD5. In MD5 images that converted into binary code. Here binary code will be the password for user. Thus, graphical password is secure than existing graphical password techniques because every time user needs to enter different set of code for authentication i.e. every time new password gets generated making Dictionary attacks, Brute Force attack, and other attacks infeasible. Because of these advantages, there is a growing interest in graphical password. In addition user can use ?document sharing? feature after authentication process and also graphical passwords can be applied to workstation, web log-in applications, ATM machines and mobile device
    • …
    corecore