A Secure Authentication- Graphical Password Authentication System

Authors

  • Uday Chandrakant Patkar HOD, Department of Computer Engineering, Bharati Vidyapeeth's College of Engineering, Lavale Pune, India
  • Shikha Bhardwaj HOD, Department of Engineering Science, Bharati Vidyapeeth's College of Engineering, Lavale Pune, India
  • Uday Shankar Patil HOD, Department of Civil Engineering, Bharati Vidyapeeth's College of Engineering, Lavale Pune, India
  • Namrata Khope Prof., ENTC Department, Bharati Vidyapeeth’s College of Engineering, Lavale Pune, India
  • Shubham Nandu Ovhal Student, Department of Computer Science, Bharati Vidyapeeth’s College of Engineering, Lavale Pune, India
  • Pranav Vinod Mahalpure Student, Department of Computer Science, Bharati Vidyapeeth’s College of Engineering, Lavale Pune, India
  • Shruti Nagar Student, Department of Computer Science, Bharati Vidyapeeth’s College of Engineering, Lavale Pune, India

Keywords:

Authentication, Password, Usability, Graphical User Interface, Security

Abstract

This paper gives brief idea about “Graphical Password Authentication System” . As we know according to human psychology , human mind have great tendency to remember pictures than that of text. By this motivation the graphical password authentication system is created as a replacement for Text-Based Passwords. The main purpose of this paper is to study about graphical password authentication system , it’s importance , advantages , drawbacks , future scope ,etc. Graphical Password authentication is grate alternative to the traditional password methods . As we all know the human mind have great capability of remembering what they see rather than alphanumeric characters and the graphical password authentication do same thing .This method allows user to register by selecting a set of pictures as he likes .The user has to select from images in specific order as he or she like as password . images for password can be from any domain like images of face, any grocery etc. so it will helps the user to remember the password. mainly this system has been developed to reduced the limitation of the alphanumerical passwords . also this is one of the solution for remembering the passwords . [1] [2].

Downloads

Download data is not yet available.

References

Graphical Password Authentication System. Pathik Nandi, Dr. Preeti Savant. Ijraset Journal For Research in Applied Science and Engineering Technology. 2022-04-19.

Graphical Password Authentication System .Akshay Karode, Sanket Mistry and Saurabh Chavan. International Journal of Engineering Research & Technology (IJERT). 9, September – 2013.

Graphical Password Authentication for Secure Online Services , Prashanthi Muddam, D.Raman, International Research Journal of Engineering and Technology (IRJET) 08,Aug-2016.

Hafiz Zahid Ullah Khan, “Comparative Study of Authentication Techniques”, International Journal of Video & Image Processing and Network Security IJVIPNS Vol: 10 No: 04.

Token Based Authentication: http://www.w3.org/2001/sw /Europe/events/foaf galway/papers/fp/token_based_authentication.

Graphical Password Authentication . K Himaja Sri , M Vishnu Vardhan, K Nikitha , K M Kiran , Mrs Saritha A K . Journal of Xi'an University of Architecture & Technology,2020.

Approaches to Authentication: http://www.e.govt.nz/plone/archive/services/see/see-pki-paper-3/chapter6.html?q=archive/services/see/see-pki-paper-3/chapter6.html .

Knowledge based Authentication: http://searchsecurity.techtarget.com/definition/knowledge-based-authentication .

A Novel Graphical Password Authentication Scheme with Improved Usability. Touraj Khodadadi; Yashar Javadianasl; Faranak Rabiei; Mojtab. IEEE 2021.

User Authentication by Secured Graphical Password Implementation, Ankesh Khandelwal, Shashank Singh, Niraj Satnalika , International Journal of Computer Applications (0975 – 8887)

I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, “The Design and Analysis of Graphical Passwords,” in Proceedings of the 8th USENIX Security Symposium, 1999.

G. E. Blonder, “Graphical Passwords,” in Lucent Technologies, Inc., Murray Hill, NJ, U. S. Patent, Ed. United States, 1996.

Passlogix, “www.passlogix.com,” last accessed in June 2005.

Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy and Nasir Memon, "Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice", SOUPS'05 Conference, July 6-8, 2005, Pittsburgh, PA, USA.

Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy and Nasir Memon, "PassPoints: Design and longitudinal evaluation of a graphical password system", International Journal of Human-Computer Studies (Special Issue on HCI Research in Privacy and Security) 63, 102-127, 2005. - Elsevier Ltd, http://www.science

Jean-Camille Birget, Dawei Hong and Nasir Memon, uGraphical Passwords Based on Robust Discretization", IEEE Transactions on Information Forensics and Security, Vol. 1, No.3, September 2006.

A. Adams and M. A. Sasse, “Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures,” Communications of th ACM, vol. 42 pp. 41-46, 1999.

R. Dhamija and A Perrig, "Deja Vu: A User Study Using Images For Authentication", 9th USENIX Security Symposium, 2000.

A Graphical Password Based System for Small Mobile Devices, Wazir Zada Khan1 , Mohammed Y Aalsalem2 and Yang Xiang, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, No 2, September 2011.

I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, “The design and analysis of graphical passwords”, In 8th USENIX Security Symposium, August 1999.

D. Lin, P. Dunphy, P. Olivier, J. Yan, “Graphical Passwords & Qualitative Spatial Relations”, Proceedings of the 3rd Symposium, On Usable Privacy and Security, Pittsburgh, USA, 2007, pp. 161-162.

P. Dunphy and J. Yan, “Do background images improve Draw a Secret" graphical passwords?”, In 14th ACM Conference on Computer and Communications Security (CCS), October 2007.

A. F. Syukri, E. Okamoto, and M. Mambo, "A User Identification System Using Signature Written with Mouse", In Third Australasian Conference on Information Security and Privacy (ACISP): Springer Verlag Lecture Notes in Computer Science (1438), 1998, pp. 403-441.

Hai tao, “Pass-Go, a New Graphical Password Scheme”, Master Thesis, University of Ottawa Canada, June 2006.

J. Goldberg, J. Hagman, and V. Sazawal, “Doodling our way to better authentication”, (student poster), In ACM Conference on Human Factors in Computing Systems (CHI), April 2002.

C. Varenhorst, “Passdoodles: A lightweight authentication method’, MIT Research Science Institute, July 2004.

H. Gao, X. Guo, X. Chen, L. Wang, and X. Liu, “YAGP: Yet another graphical password strategy”, In Annual Computer Security Applications Conference, 2008.

M. Orozco, B. Malek, M. Eid, and A. El Saddik, “Haptic-based sensible graphical password”, In Proceedings of Virtual Concept, 2006.

Barwal, R. K. ., Raheja, N. ., Mohan, B. R. ., U, Y. ., Gadde, S. S. ., & Patil, M. . (2023). Analysis and Classification of Breast Cancer Disease Via Different Datasets and Classifier Models. International Journal on Recent and Innovation Trends in Computing and Communication, 11(3s), 135–143. https://doi.org/10.17762/ijritcc.v11i3s.6174

Yathiraju, D. . (2022). Blockchain Based 5g Heterogeneous Networks Using Privacy Federated Learning with Internet of Things. Research Journal of Computer Systems and Engineering, 3(1), 21–28. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/37

Downloads

Published

04.11.2023

How to Cite

Patkar, U. C. ., Bhardwaj, S. ., Patil, U. S. ., Khope, N. ., Ovhal, S. N. ., Mahalpure, P. V. ., & Nagar, S. . (2023). A Secure Authentication- Graphical Password Authentication System. International Journal of Intelligent Systems and Applications in Engineering, 12(3s), 209–217. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3699

Issue

Section

Research Article