Graphical Password Authentication System Using Persuasive Cued Click Point
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 3
Abstract
The main issues of knowledge-based authentication usually text-based passwords, are well known. Users tend to choose memorable passwords that are easy for attackers to guess, but strong system assigned passwords are difficult for users to remember. In this paper focuses on the integrated evaluation of the Persuasive Cued Click Points graphical password authentication system, including usability and security. An important usability goal for authentication systems is to support users in selecting better passwords, thus increasing security by expanding the effective password space. In click-based graphical passwords, poorly chosen passwords lead to the emergence of hotspots (portions of the image where users are more likely to select click-points, allowing attackers to mount more successful dictionary attacks). We use persuasion to influence user choice is used in click-based graphical passwords encouraging users to select more random, and hence more difficult to guess, clickpoints.
Authors and Affiliations
Shraddha Wagh, Rupali Navalkar, Prof. R. P. Bijwe
slugFPGA Implementation OF Iterative Log Multiplier Using Operand Decomposition For Image Processing Application
Faster multiplier is the vital procedure mainly for DSP and image processing application. Log multiplier converts the multiplication into addition, hence speed up the multiplication. Mitchell’s approximation based log m...
Experimental study on partial replacement of Fine aggregate with marble powder and Green sand in concrete
The development of concrete has brought about the essential need for additives both chemical and mineral to improve the performance of concrete. Most of the developments across the work have been supported by continuous...
A Smart Helmet for Air Quality and Hazardous Event Detection for the Mining Industry
A smart helmet has been developed that is able to detect of hazardous events in the mines industry. In the development of helmet, we have considered the four main types of hazard such as air quality, helmet removal, fir...
Secure Data Deduplication in Cloud
Secure deduplication is a system for discarding duplicate copies of limit data, and offers security to them. To lessening storage space and exchange information move limit in circulated stockpiling deduplication has bee...
Comparative Analysis for Least Mean Square and Normalized LMS for Speech Enhancement Application
Adaptive Signal Processing (ASP) is an active research area. Adaptive Filter based speech enhancement technique is now a day’s getting very popular due to wide range of applications like mobile communication, hearing ai...