Persuasive Cued Click Based Graphical Password with  Scrambling For Knowledge Based Authentication Technique with  Image Scrambling

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 13, Issue 2

Abstract

 Adequate user authentication is a persistent problem, particularly with hand- held devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization’s  influence. Yet, these devices are being used increasingly in corporate settings where they pose a security risk,  not only by containing sensitive information, but also by providing the means to access such information over  wireless network interfaces. User authentication is the first line of defense for a lost or stolen PDA. How- ever,  motivating users to enable simple PIN or password mechanisms and periodically update their authentication  information is a constant struggle. This paper describes a general-purpose mechanism for authenticating a user  to a PDA using a visual login technique called Picture Password. The underlying rationale is that image recall  is an easy and natural way for users to authenticate, removing a serious barrier to compliance with  organizational policy. Features of Picture Password include style dependent image selection, password reuse,  and embedded salting, which overcome a number of problems with knowledge-based authentication for handheld devices. Though designed specifically for handheld devices, Picture Password is also suitable for  note-books, workstations, and other computational devices. Scrambling technique is applied to make image  recognition more complex during the login process and thus protecting from the common attacks in the  graphical password system

Authors and Affiliations

BINITHA V . M

Keywords

Related Articles

 Text Clustering in Distributed Networks with Enhanced File Security

 Abstract: Text Clustering technique is widely used in both centralized and distributed environments for information retrieval. Centralized approaches are used in traditional text clustering algorithms. In such appr...

An innovative scheme for representation of signed numbers employing ternary logic and method of development of semiconductor optical amplifiers based wavelength encoded optical ternary half adder

Abstract: In binary logic, two different logical states are used to represent signed as well as unsigned numbers. In case of signed numbers one bit, usually the Most Significant Bit is solely devoted to represent the sig...

 Performance Analysis of Compression Techniques Using SVD,BTC, DCT and GP

 Abstract: Digital image compression techniques minimize the size in bytes of a graphics file without degradingthe quality of the image to an acceptable level. The reduction in file size allows more images to be sto...

 An Approach to Single Documnent Text Summarization & Simplification

 Abstract: The amount of information available on the internet is increasing day by day which is leading to information overload. For more information than can realistically be digested is available on the World-Wid...

 Hospital Inpatient Caring By Markov Decision Process

Many challenges have been faced by the health care system involving high rates of drug-resistant and hospital-acquired disease, failures of care delivery leading to preventable adverse health events and skyrocketing cost...

Download PDF file
  • EP ID EP161884
  • DOI -
  • Views 107
  • Downloads 0

How To Cite

BINITHA V . M (2013).  Persuasive Cued Click Based Graphical Password with  Scrambling For Knowledge Based Authentication Technique with  Image Scrambling. IOSR Journals (IOSR Journal of Computer Engineering), 13(2), 14-24. https://europub.co.uk/articles/-A-161884