A Study of Various Passwords Authentication Techniques
نویسندگان
چکیده
Information and computer security is supported by passwords. Password is the principal part of authentication process. The traditional authentication method is to use text-based password which is also called alphanumeric password. But it has significant drawbacks. So to overcome vulnerabilities of this traditional password scheme a graphical password scheme is developed. But major drawback of graphical scheme is it is vulnerable to shoulder surfing attack and also sometimes to spyware attack. So alternative technique to graphical password a Captcha technique is developed. The major advantage of Captcha is that it can not be identified by bots. Captcha gives the protection from unwanted bots. Also there are some limitations of Captcha, and to overcome those after Captcha for more robust security a new technique is developed
منابع مشابه
A Comparison of Password Techniques for Multilevel Authentication Mechanisms
Various mechanisms for authenticating users of computer-based information systems have been proposed. These include traditional, user-selected passwords, system-generated passwords, passphrases, cognitive passwords and associative passwords. While the mechanisms employed in primary passwords are determined by the operating systems' manufacturers, system designers can select any password mechani...
متن کاملSurvey on Various Techniques of User Authentication and Graphical Password
The process of identifying an individual usually based on a username and password. Passwords are the best commonly used method for identifying users in computer and communication systems. Usually, passwords are strings of letters and digits, i.e., they are alpha-numeric. Graphical passwords, which contain of some actions that the user accomplishes on an image.In this paper we make a survey of t...
متن کاملComparative Analysis of Recall-based (Drawmetric) and Click-based (Locimetric) Graphical Password Authentication Schemes
The authentication process can be broken up in “identification”, “verification” and “authorization” steps. For both identification and verification, passwords are simplest of the means. They are the most frequently used technique for determining whether someone or something is, in fact, who or what as being claimed. Traditionally textual passwords are used for authentication. Such passwords, ap...
متن کامللبخوانی: روش جدید احراز هویت در برنامههای کاربردی گوشیهای تلفن همراه اندروید
Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...
متن کاملPalm Vein Extraction and Matching for Personal Identification and Liveness Detection
The most common method used for authentication is Textual passwords. But Textual passwords are in risk to eves dropping, dictionary attacks, social engineering and shoulder surfing. Biometric passwords are introduced as alternative techniques to textual passwords. Biometrics is used for human recognition which consists of authentication, verification and recognition. A CCD camera will capture t...
متن کاملAuthentication Mechanisim For Session Passwords By Imposing Color With Text
The most common method used for authentication is Textual passwords. But textual passwords are in risk to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are helpless to shoulder surfing. To address this problem, text can be combined with images or colors ...
متن کامل