Two Level Authentication System Based on Pair Based Authentication and Image Selection
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 4
Abstract
This paper presents a two level authentication using pair based authentication and image selection. The most common method for authentication is textual passwords. Though textual passwords are easy to remember, they are vulnerable to eaves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords have been introduced as an alternative to textual passwords. But same as textual passwords, shoulder surfing attacks make most of the graphical schemes vulnerable. To address this problem, textual passwords can be combined with graphical schemes in what gives a two level security. This paper presents an integrated evaluation of the pair based passwords and graphical password scheme, including usability and security evaluations and implementation considerations.
Authors and Affiliations
Madhuri Achmani, Radhika Dehaley, Anuja Gaonkar, Anindita Khade
Design of an Embedded System for Fake Biometric Detection Using Image Quality Assessment
To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of...
Multiparty Authorization for Online Social Network
Web-based online social networks (WBOSNs) are online communities where participants or users can share information and resources with each other with known users and unknown users. In current online social networks user...
slugA Review on Artificial Intelligence Techniques Applied in End Milling
in today’s fast changing scenario in manufacturing industries, End milling machining is an operation which produces variety of shapes and surfaces with varying surface roughness. The application of effective optimizatio...
slugAn approach of false misbehaviour removal in wireless sensor network using clonal selection algorithm and change point detection
Security of wireless sensor network becomes crucial key factor in the latest research available in the fast deployment of wireless sensor network. The time interval between an attack detection and corrective action take...
An Approach for Intrusion Detection using HoneyPots to Improve Network Security
For every consumer and business that is on the Internet, viruses, worms and crackers are a few security threats. There are the obvious tools that aid information security professionals against these problems such as ant...