M-Wallet Security using Cued Click Points

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2

Abstract

 Abstract: The main goal of this paper is to provide higher level of security by using graphical password authentication scheme. Text passwords are easily broken by various intruders and may hack all confidential information of user. User often create memorable passwords that are easy for attackers to guess, but strong system –assigned passwords are difficult for user to remember. So we are making use of alternative method where graphical images are used as passwords as human brains are better at recognizing images than text. The main goal of our work is to reduce the guessing attacks as well as encouraging users to select more random, and difficult password to guess so that various security threats like brute force attacks, dictionary attacks, social engineering attacks ,shoulder surfing attacks can be successfully removed.

Authors and Affiliations

Miss. Deepika Mhetre, , Miss. Komal Murkute, , Miss. Vishranti Kale, , Miss. Apurva Kabra , Prof. Sonali Madankar

Keywords

Related Articles

Optimal Planning of the Production of Corpus Details on Metal Cutting Machines with the Help of Computer Numeric Control

Abstract: The optimal planning of details mechanical processing is a key problem, directly affecting the productivity and efficiency of the activity of a machine building company. The combinatorial character of the prob...

 AUTOPARK: A Sensor Based, Automated, Secure and Efficient Parking Guidance System

 Nowadays, due to modern and lavish lifestyles people prefer their own vehicles while going anywhere, resulting in increased traffic congestion and parking problems. In this paper, we propose and present a complet...

A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition

Abstract: Now a day with incredible change in social media network such as mobile communication and computer, all type of a data such as audio, video, images are used for the communication .Privacy for that data is an im...

 Modelling and Control of a Robotic Arm Using Artificial Neural  Network

 Often it can be seen that men with a lost arm face severe difficulties doing daily chores. Artificial Intelligence could be effectively used to provide some respite to those people. Neural networks and their &nbs...

 Video Transmission over Mobile Adhoc Network Using WEAC Protocol with Zone Routing Algorithm

 In mobile adhoc network (MANET), a node communicates directly with the nodes within wireless range and indirectly with other nodes using a dynamically computed, multi-hop route via the other nodes of the manet. In...

Download PDF file
  • EP ID EP126601
  • DOI 10.9790/0661-162106369
  • Views 116
  • Downloads 0

How To Cite

Miss. Deepika Mhetre, , Miss. Komal Murkute, , Miss. Vishranti Kale, , Miss. Apurva Kabra, Prof. Sonali Madankar (2014).  M-Wallet Security using Cued Click Points. IOSR Journals (IOSR Journal of Computer Engineering), 16(2), 63-69. https://europub.co.uk/articles/-A-126601