Research and development of user authentication using graphical passwords

A prospective methodology

Reshma, G. Shivaprasad

Research output: Contribution to journalArticle

Abstract

Nowadays in information security user authentication is a very important task. In most of the computer, user authentication depends on the alphanumeric username and password. It means text-based password. But, this is not highly secure because of hackers can easily break the password. Brute force attack, dictionary attack, guessing attack etc. these all are some possible attacks on the password. If the user chooses a difficult password to prevent the system from the attackers which is very much harder for the user to remember such a difficult password. So, to resolve this problem introduced a new technique called graphical password authentication. This paper presents a detailed survey of user authentication techniques using a graphical password. It contains basically two type approaches. They are recognition-based and recall-based approaches. This survey discusses the different techniques about Graphical password authentication and their advantages and limitations. The survey provides a roadmap for the development of new graphical authentication scheme.

Original languageEnglish
Pages (from-to)385-390
Number of pages6
JournalInternational Journal of Innovative Technology and Exploring Engineering
Volume8
Issue number9 Special Issue 3
DOIs
Publication statusPublished - 01-07-2019
Externally publishedYes

Fingerprint

Authentication
Security of data
Glossaries

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Civil and Structural Engineering
  • Mechanics of Materials
  • Electrical and Electronic Engineering

Cite this

@article{70527d5c5e414cfbba3ab8615929e48e,
title = "Research and development of user authentication using graphical passwords: A prospective methodology",
abstract = "Nowadays in information security user authentication is a very important task. In most of the computer, user authentication depends on the alphanumeric username and password. It means text-based password. But, this is not highly secure because of hackers can easily break the password. Brute force attack, dictionary attack, guessing attack etc. these all are some possible attacks on the password. If the user chooses a difficult password to prevent the system from the attackers which is very much harder for the user to remember such a difficult password. So, to resolve this problem introduced a new technique called graphical password authentication. This paper presents a detailed survey of user authentication techniques using a graphical password. It contains basically two type approaches. They are recognition-based and recall-based approaches. This survey discusses the different techniques about Graphical password authentication and their advantages and limitations. The survey provides a roadmap for the development of new graphical authentication scheme.",
author = "Reshma and G. Shivaprasad",
year = "2019",
month = "7",
day = "1",
doi = "10.35940/ijitee.I3071.0789S319",
language = "English",
volume = "8",
pages = "385--390",
journal = "International Journal of Innovative Technology and Exploring Engineering",
issn = "2278-3075",
publisher = "Blue Eyes Intelligence Engineering and Sciences Publication",
number = "9 Special Issue 3",

}

Research and development of user authentication using graphical passwords : A prospective methodology. / Reshma; Shivaprasad, G.

In: International Journal of Innovative Technology and Exploring Engineering, Vol. 8, No. 9 Special Issue 3, 01.07.2019, p. 385-390.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Research and development of user authentication using graphical passwords

T2 - A prospective methodology

AU - Reshma,

AU - Shivaprasad, G.

PY - 2019/7/1

Y1 - 2019/7/1

N2 - Nowadays in information security user authentication is a very important task. In most of the computer, user authentication depends on the alphanumeric username and password. It means text-based password. But, this is not highly secure because of hackers can easily break the password. Brute force attack, dictionary attack, guessing attack etc. these all are some possible attacks on the password. If the user chooses a difficult password to prevent the system from the attackers which is very much harder for the user to remember such a difficult password. So, to resolve this problem introduced a new technique called graphical password authentication. This paper presents a detailed survey of user authentication techniques using a graphical password. It contains basically two type approaches. They are recognition-based and recall-based approaches. This survey discusses the different techniques about Graphical password authentication and their advantages and limitations. The survey provides a roadmap for the development of new graphical authentication scheme.

AB - Nowadays in information security user authentication is a very important task. In most of the computer, user authentication depends on the alphanumeric username and password. It means text-based password. But, this is not highly secure because of hackers can easily break the password. Brute force attack, dictionary attack, guessing attack etc. these all are some possible attacks on the password. If the user chooses a difficult password to prevent the system from the attackers which is very much harder for the user to remember such a difficult password. So, to resolve this problem introduced a new technique called graphical password authentication. This paper presents a detailed survey of user authentication techniques using a graphical password. It contains basically two type approaches. They are recognition-based and recall-based approaches. This survey discusses the different techniques about Graphical password authentication and their advantages and limitations. The survey provides a roadmap for the development of new graphical authentication scheme.

UR - http://www.scopus.com/inward/record.url?scp=85072100891&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85072100891&partnerID=8YFLogxK

U2 - 10.35940/ijitee.I3071.0789S319

DO - 10.35940/ijitee.I3071.0789S319

M3 - Article

VL - 8

SP - 385

EP - 390

JO - International Journal of Innovative Technology and Exploring Engineering

JF - International Journal of Innovative Technology and Exploring Engineering

SN - 2278-3075

IS - 9 Special Issue 3

ER -