A NOVEL 2 STEP RANDOM COLORED GRID GRAPHICAL PASSWORD AUTHENTICATION SYSTEM
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 4
Abstract
Security in the computer is largely supported by passwords for authentication process. Use of alphanumeric passwords is the most common Authentication method. This conventional authentication method has been shown to have significant drawbacks. To overcome the vulnerabilities of traditional methods, numerous graphical password authentication systems have been proposed. These graphical passwords are usually seen as complex and time consuming. Furthermore, the existing graphical passwords are susceptible to spyware and shoulder surfing attacks. In this paper we propose this novel graphical password scheme to abolish well known security threats like brute force attacks, dictionary attacks, phishing attacks and spyware attacks.
Authors and Affiliations
P. V. S Sriram , G. Sri Swetha
MULTI LAYER NEURAL NETWORK AND SOUNDEX ALGORITHMS FOR TEXT RECOGNITION MODEL
This paper presents a text recognition model based on two algorithms multi-layer neural networks and Soundex algorithms. The text recognition model receives, recognize the text SMS sent by the user. Based on recognition,...
HCI and Eye Tracking : Emotion Recognition Using Hidden Markov Model
Recognition of Emotion can be identified using Eye Tracking methods which may be non-intrusive. SVD and HMM are used for eye tracking to recognize emotions, which classifies six different emotions with less correlation c...
Reduce Total Distance and Time Using Genetic Algorithm in Traveling Salesman Problem
Traveling salesman problem is quite known in the field of combinatorial optimization. Through this research describe how the traveling salesman problem is solved by the heuristic method of genetic algorithms. This resear...
Genetic Approach to Find Optimal Moves for Prisoner Dilemma Game
The Prisoner‘s Dilemma, a simple two-person game invented by Merrill Flood & Melvin Dresher in the 1950s, has been studied extensively in Game Theory. Till now the work has been done to study the environment in which...
Malicious Code Detection through Data Mining Techniques
Nowadays computer systems and communication infrastructures are likely to be influenced by different types of attacks so there is need to put further efforts for improving the software trust. Therefore, there will be inc...