Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge Based Authentication Technique with Image Scrambling
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 13, Issue 2
Abstract
Adequate user authentication is a persistent problem, particularly with hand- held devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization’s influence. Yet, these devices are being used increasingly in corporate settings where they pose a security risk, not only by containing sensitive information, but also by providing the means to access such information over wireless network interfaces. User authentication is the first line of defense for a lost or stolen PDA. How- ever, motivating users to enable simple PIN or password mechanisms and periodically update their authentication information is a constant struggle. This paper describes a general-purpose mechanism for authenticating a user to a PDA using a visual login technique called Picture Password. The underlying rationale is that image recall is an easy and natural way for users to authenticate, removing a serious barrier to compliance with organizational policy. Features of Picture Password include style dependent image selection, password reuse, and embedded salting, which overcome a number of problems with knowledge-based authentication for handheld devices. Though designed specifically for handheld devices, Picture Password is also suitable for note-books, workstations, and other computational devices. Scrambling technique is applied to make image recognition more complex during the login process and thus protecting from the common attacks in the graphical password system
Authors and Affiliations
BINITHA V . M
Text Clustering in Distributed Networks with Enhanced File Security
Abstract: Text Clustering technique is widely used in both centralized and distributed environments for information retrieval. Centralized approaches are used in traditional text clustering algorithms. In such appr...
An innovative scheme for representation of signed numbers employing ternary logic and method of development of semiconductor optical amplifiers based wavelength encoded optical ternary half adder
Abstract: In binary logic, two different logical states are used to represent signed as well as unsigned numbers. In case of signed numbers one bit, usually the Most Significant Bit is solely devoted to represent the sig...
Performance Analysis of Compression Techniques Using SVD,BTC, DCT and GP
Abstract: Digital image compression techniques minimize the size in bytes of a graphics file without degradingthe quality of the image to an acceptable level. The reduction in file size allows more images to be sto...
An Approach to Single Documnent Text Summarization & Simplification
Abstract: The amount of information available on the internet is increasing day by day which is leading to information overload. For more information than can realistically be digested is available on the World-Wid...
Hospital Inpatient Caring By Markov Decision Process
Many challenges have been faced by the health care system involving high rates of drug-resistant and hospital-acquired disease, failures of care delivery leading to preventable adverse health events and skyrocketing cost...