Two Level Authentication System Based on Pair Based Authentication and Image Selection

Abstract

This paper presents a two level authentication using pair based authentication and image selection. The most common method for authentication is textual passwords. Though textual passwords are easy to remember, they are vulnerable to eaves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords have been introduced as an alternative to textual passwords. But same as textual passwords, shoulder surfing attacks make most of the graphical schemes vulnerable. To address this problem, textual passwords can be combined with graphical schemes in what gives a two level security. This paper presents an integrated evaluation of the pair based passwords and graphical password scheme, including usability and security evaluations and implementation considerations.

Authors and Affiliations

Madhuri Achmani, Radhika Dehaley, Anuja Gaonkar, Anindita Khade

Keywords

Related Articles

Experimental Investigation on the Performance of Plastic Aggregate Concrete

This study is intended to explore the suitability of recycled high density polyethylene (HDPE) as coarse aggregate in concrete. Effect of replacement of coarse aggregate with various percentages (0% to 40%) of plastic a...

A Review of complexity method for wireless Channel Estimation using a BEM

Our channel estimation method differs in its ability to estimate fast time-varying wireless channel since pilot tones are inserted into each OFDM block, and in its explicit relation with space-frequency code design whic...

A performance monitoring tool for translators

We exhibit a device for the assessment of interpretation quality. In the first place, the run of the mill prerequisites of such a device in the system of machine interpretation (MI) exploration are examined. We characte...

Security Problems and Their Defenses in TCP/IP Protocol Suite

The Transmission Control Protocol/Internet Protocol (TCP/IP) is combination of different protocols at various layers.TCP/IP is the basic communication language or protocol of the Internet and private networks either an...

Differentiate Different Methodology for Design of Vedic Multiplier

Multiplier is one of the most important part in any processor speed which improves the speed of the operation for example in special application processors like Digital Signal Processor (DSPs). Basically, the operationa...

Download PDF file
  • EP ID EP22055
  • DOI -
  • Views 219
  • Downloads 5

How To Cite

Madhuri Achmani, Radhika Dehaley, Anuja Gaonkar, Anindita Khade (2016). Two Level Authentication System Based on Pair Based Authentication and Image Selection. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(4), -. https://europub.co.uk/articles/-A-22055