Dynamic Passwords Using Graphics

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5

Abstract

Abstract:Textual passwords are most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are vulnerable toshoulder surfing. To address this problem, text can be combined with images or colors to generate session passwords for authentication. Session passwords can be used only once and every time a new password is generated. In this paper, two techniques are proposed to generate session passwords using text and colors which are resistant to shoulder surfing. These methods are suitable for Personal Digital Assistants.

Authors and Affiliations

Abhinav Sharma, Rupali PaunikarRoni Raj Das, Prerak Sola

Keywords

Related Articles

 Object Detection by Estimation of the Spectral Attenuation Coefficient in the Submerged Medium

 Abstract:Underwater object detection has a considerable impact in the field of ocean technology. This paper presents a techniqueto detect a submerged object based on the medium’s spectral attenuation coefficient by...

 A Survey and Study of Image Compression Methods

 Abstract: This paper focuses on the area of Image Compression which is used in various Image Processing Applications. This paper presents a survey and study of various image compression techniques primarily, The Pr...

 Monitoring Selfish Nodes in MANET during Replica Allocation

 Abstract: Mobile Ad Hoc Network is a collection of mobile hosts. The mobility nature of the MANET causes the mobile host to move freely in the network, due to that network disconnections occurs frequently and this...

 Enabling Lazy Learning for Uncertain Data Streams

 Abstract: Lazy learning concept is performing the k-nearest neighbor algorithm, Is used to classification andsimilarly to clustering of k-nearest neighbor algorithm both are based on Euclidean distance based algori...

Filter Based addressing protocol for effective Node Auto configuration in Ad hoc Network

MANET is used for many distributed network, the lack of a centralized administration makes these networks attractive for several distributed applications, such as sensing, Internet access to deprived communities, and dis...

Download PDF file
  • EP ID EP90932
  • DOI -
  • Views 114
  • Downloads 0

How To Cite

Abhinav Sharma, Rupali PaunikarRoni Raj Das, Prerak Sola (2016). Dynamic Passwords Using Graphics. IOSR Journals (IOSR Journal of Computer Engineering), 18(5), 69-73. https://europub.co.uk/articles/-A-90932