Review on Graphical Authentication Technique
نویسندگان
چکیده
منابع مشابه
A Review on Shoulder Surfing Attack in Authentication Technique
Security is a important factor in computer system now a days. Users of computer system give a primary preference to security. Authentication is a process used to provide security to the user. Authentication is a process of identifying the person’s identity or conforming the identity of a particular person. There are various authentication method, but most commonly used method is textual passwor...
متن کاملGraphical Authentication Using Region Based Graphical Password
Password authentication is failing as an authentication since it increases the user burden to remember the passwords. Graphical authentication is proposed as a alternative for textual passwords since it may be easy for users to remember.In this paper we propose a new image region selection based graphical password scheme. We are going to present a new technique for authentication which is based...
متن کاملTactile vs Graphical Authentication
This paper describes a novel approach to authenticate entry to a system using tactile feedback. The user is required to remember a sequence of pre-selected pin patterns. A study has been undertaken to determine the feasibility of the tactile authentication mechanism, through a comparison with a graphical scheme. Findings from a within-subjects study have revealed that both tactile and graphical...
متن کاملGraphical Authentication Based Techniques
The password techniques used in market are very insecure. The textual passwords which we normally use suffer with both security and usability problems. Therefore in this extended abstract, we have discussed different graphical password authentication systemssuch as Cued Click Points (CCP), a cued-recall graphical password technique and other techniques which uses sound signature for password au...
متن کاملSecurity in Graphical Authentication
Graphical Authentication Systems are a potential replacement or supplement for conventional authentication systems. Several studies have suggested graphical authentication may offer greater resistance to guessing and capture attacks but there are other attacks against graphical authentication including social engineering, brute force attacks, shoulder surfing, intercepted communication and spyw...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology
سال: 2018
ISSN: 2321-9653
DOI: 10.22214/ijraset.2018.3257