Sound Signature in Graphical Password
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 3
Abstract
Mostly user select password that is predictable. This happens with both graphical and text based passwords. Users tend to choose memorable password, unfortunately it means that the passwords tend to follow predictable patterns that are easier for attackers to guess. While the predictability problem can be solved by disallowing user choice and assigning passwords to users, this usually leads to usability issues since users cannot easily remember such random passwords. Numbers of graphical password systems have been developed. Study shows that text-based passwords suffer with both security and usability problems. According to a recent news article, a security team at a company ran a network password cracker and within 30 seconds and they identified about 80% of the passwords. It is well know that the human brain is better at recognizing and recalling images than text, graphical passwords exploit this human characteristic. We proposed a sound signature graphical password consists of user-chosen click points in a displayed image.
Authors and Affiliations
Monali D. Supare, Swati V. Badone, Prof. R. P. Bijwe
Comparative Analysis of Hybrid DKT-DCT with DKT and DCT in Image Compression
Image compression is one of the prominent applications of image processing. It has triggered the need of data compression so that volume of data and bandwidth required to transmit it can be reduced. Still image compress...
A Comparative Study between Hamming Code and Reed-Solomon Code in Byte Error Detection and Correction
This work concerns the comparative study between Hamming code and Reed-Solomon (RS) code in byte error detection and correction. Data are either stored in storage applications or transferred through a media. In either c...
Improvement of Power Quality using Shunt Active Power Filter by Neural Learning Algorithm Technique
This paper presents a better analysis of Shunt active power filter for enhancing the power quality. The shunt active power filter has been designed to mitigate total harmonics distortions, instantaneous power factor and...
Introduction and Security Applications of Computational Intelligence
Computational intelligence is the study of the design of intelligent agents. An agent is something that acts in an environment—it does something. Agents include worms, dogs, thermostats, airplanes, humans, organizations...
Adaptive Fast Exemplar-Based Image Inpainting For Object Removal using Nelder-Mead simplex Algorithm
Image inpainting is the prime important technique used for removing defect from paintings and photographs. The challenge for the inpainting is to fill in the hole that is left behind in a visually plausible way so that...