منابع مشابه
Graphical Authentication Using Region Based Graphical Password
Password authentication is failing as an authentication since it increases the user burden to remember the passwords. Graphical authentication is proposed as a alternative for textual passwords since it may be easy for users to remember.In this paper we propose a new image region selection based graphical password scheme. We are going to present a new technique for authentication which is based...
متن کاملTactile vs Graphical Authentication
This paper describes a novel approach to authenticate entry to a system using tactile feedback. The user is required to remember a sequence of pre-selected pin patterns. A study has been undertaken to determine the feasibility of the tactile authentication mechanism, through a comparison with a graphical scheme. Findings from a within-subjects study have revealed that both tactile and graphical...
متن کاملGraphical Authentication Based Techniques
The password techniques used in market are very insecure. The textual passwords which we normally use suffer with both security and usability problems. Therefore in this extended abstract, we have discussed different graphical password authentication systemssuch as Cued Click Points (CCP), a cued-recall graphical password technique and other techniques which uses sound signature for password au...
متن کاملSecurity in Graphical Authentication
Graphical Authentication Systems are a potential replacement or supplement for conventional authentication systems. Several studies have suggested graphical authentication may offer greater resistance to guessing and capture attacks but there are other attacks against graphical authentication including social engineering, brute force attacks, shoulder surfing, intercepted communication and spyw...
متن کاملGraphical Authentication: Justifications and Objectives
Password authentication has failed to address the compounding business requirement for increased security. Biometric authentication is beginning to address the need for tighter security, but it costs several orders of magnitude more than basic password implementations. Biometric authentication also possesses several shortcomings that inhibit its widespread adoption. In this paper we describe th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IJARCCE
سال: 2017
ISSN: 2278-1021
DOI: 10.17148/ijarcce.2017.65102