Persuasive Cued Click Based Graphical Password with  Scrambling For Knowledge Based Authentication Technique with  Image Scrambling

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 13, Issue 2

Abstract

 Adequate user authentication is a persistent problem, particularly with hand- held devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization’s  influence. Yet, these devices are being used increasingly in corporate settings where they pose a security risk,  not only by containing sensitive information, but also by providing the means to access such information over  wireless network interfaces. User authentication is the first line of defense for a lost or stolen PDA. How- ever,  motivating users to enable simple PIN or password mechanisms and periodically update their authentication  information is a constant struggle. This paper describes a general-purpose mechanism for authenticating a user  to a PDA using a visual login technique called Picture Password. The underlying rationale is that image recall  is an easy and natural way for users to authenticate, removing a serious barrier to compliance with  organizational policy. Features of Picture Password include style dependent image selection, password reuse,  and embedded salting, which overcome a number of problems with knowledge-based authentication for handheld devices. Though designed specifically for handheld devices, Picture Password is also suitable for  note-books, workstations, and other computational devices. Scrambling technique is applied to make image  recognition more complex during the login process and thus protecting from the common attacks in the  graphical password system

Authors and Affiliations

BINITHA V . M

Keywords

Related Articles

A Novel Approach For Data Hiding In Web Page Steganography Using Encryption With Compression Based Technique

Abstract: Cryptography, Steganography and Watermarking are three rudimentary techniques which will avail us to secure data from unauthorized access. Steganography is one of the best techniques to obnubilate messagefrom u...

 Captcha Recognition and Robustness Measurement using Image  Processing Techniques

 The advances in web-based technology have revolutionized the way people communicate and share information, necessitating firm security measures. Network security prevents and monitors unauthorized access,  m...

 Enhancing The Ic Engine Performance By Using The ElectrolysisAnd Preheating Process

 Abstract:Our present fuel resources are not going to be around forever and with the ever increasing consumption their extinction is nearly unavoidable. Also our fuel resources which are mostly made up of fossil f...

Artificial Neural Network To Detect Know And Unknown DDOS Attack

The key objective of Disturbed Denial of Service (DdoS) attack is to compile multiple systems across the internet with the infected zombies/agents and form the botnets of network. The infected systems are remotely contro...

 W-LEACH Decentralized: Weighted LEACH with a Decentralized way

 Abstract: A mobile WSN is considered as a collection of wireless mobile nodes and a base station forming an ad-hoc network. This type of network is used in various areas; such as underwater and underground. Each no...

Download PDF file
  • EP ID EP161884
  • DOI -
  • Views 108
  • Downloads 0

How To Cite

BINITHA V . M (2013).  Persuasive Cued Click Based Graphical Password with  Scrambling For Knowledge Based Authentication Technique with  Image Scrambling. IOSR Journals (IOSR Journal of Computer Engineering), 13(2), 14-24. https://europub.co.uk/articles/-A-161884