A Secure Authentication- Graphical Password Authentication System
Keywords:
Authentication, Password, Usability, Graphical User Interface, SecurityAbstract
This paper gives brief idea about “Graphical Password Authentication System” . As we know according to human psychology , human mind have great tendency to remember pictures than that of text. By this motivation the graphical password authentication system is created as a replacement for Text-Based Passwords. The main purpose of this paper is to study about graphical password authentication system , it’s importance , advantages , drawbacks , future scope ,etc. Graphical Password authentication is grate alternative to the traditional password methods . As we all know the human mind have great capability of remembering what they see rather than alphanumeric characters and the graphical password authentication do same thing .This method allows user to register by selecting a set of pictures as he likes .The user has to select from images in specific order as he or she like as password . images for password can be from any domain like images of face, any grocery etc. so it will helps the user to remember the password. mainly this system has been developed to reduced the limitation of the alphanumerical passwords . also this is one of the solution for remembering the passwords . [1] [2].
Downloads
References
Graphical Password Authentication System. Pathik Nandi, Dr. Preeti Savant. Ijraset Journal For Research in Applied Science and Engineering Technology. 2022-04-19.
Graphical Password Authentication System .Akshay Karode, Sanket Mistry and Saurabh Chavan. International Journal of Engineering Research & Technology (IJERT). 9, September – 2013.
Graphical Password Authentication for Secure Online Services , Prashanthi Muddam, D.Raman, International Research Journal of Engineering and Technology (IRJET) 08,Aug-2016.
Hafiz Zahid Ullah Khan, “Comparative Study of Authentication Techniques”, International Journal of Video & Image Processing and Network Security IJVIPNS Vol: 10 No: 04.
Token Based Authentication: http://www.w3.org/2001/sw /Europe/events/foaf galway/papers/fp/token_based_authentication.
Graphical Password Authentication . K Himaja Sri , M Vishnu Vardhan, K Nikitha , K M Kiran , Mrs Saritha A K . Journal of Xi'an University of Architecture & Technology,2020.
Approaches to Authentication: http://www.e.govt.nz/plone/archive/services/see/see-pki-paper-3/chapter6.html?q=archive/services/see/see-pki-paper-3/chapter6.html .
Knowledge based Authentication: http://searchsecurity.techtarget.com/definition/knowledge-based-authentication .
A Novel Graphical Password Authentication Scheme with Improved Usability. Touraj Khodadadi; Yashar Javadianasl; Faranak Rabiei; Mojtab. IEEE 2021.
User Authentication by Secured Graphical Password Implementation, Ankesh Khandelwal, Shashank Singh, Niraj Satnalika , International Journal of Computer Applications (0975 – 8887)
I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, “The Design and Analysis of Graphical Passwords,” in Proceedings of the 8th USENIX Security Symposium, 1999.
G. E. Blonder, “Graphical Passwords,” in Lucent Technologies, Inc., Murray Hill, NJ, U. S. Patent, Ed. United States, 1996.
Passlogix, “www.passlogix.com,” last accessed in June 2005.
Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy and Nasir Memon, "Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice", SOUPS'05 Conference, July 6-8, 2005, Pittsburgh, PA, USA.
Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy and Nasir Memon, "PassPoints: Design and longitudinal evaluation of a graphical password system", International Journal of Human-Computer Studies (Special Issue on HCI Research in Privacy and Security) 63, 102-127, 2005. - Elsevier Ltd, http://www.science
Jean-Camille Birget, Dawei Hong and Nasir Memon, uGraphical Passwords Based on Robust Discretization", IEEE Transactions on Information Forensics and Security, Vol. 1, No.3, September 2006.
A. Adams and M. A. Sasse, “Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures,” Communications of th ACM, vol. 42 pp. 41-46, 1999.
R. Dhamija and A Perrig, "Deja Vu: A User Study Using Images For Authentication", 9th USENIX Security Symposium, 2000.
A Graphical Password Based System for Small Mobile Devices, Wazir Zada Khan1 , Mohammed Y Aalsalem2 and Yang Xiang, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, No 2, September 2011.
I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, “The design and analysis of graphical passwords”, In 8th USENIX Security Symposium, August 1999.
D. Lin, P. Dunphy, P. Olivier, J. Yan, “Graphical Passwords & Qualitative Spatial Relations”, Proceedings of the 3rd Symposium, On Usable Privacy and Security, Pittsburgh, USA, 2007, pp. 161-162.
P. Dunphy and J. Yan, “Do background images improve Draw a Secret" graphical passwords?”, In 14th ACM Conference on Computer and Communications Security (CCS), October 2007.
A. F. Syukri, E. Okamoto, and M. Mambo, "A User Identification System Using Signature Written with Mouse", In Third Australasian Conference on Information Security and Privacy (ACISP): Springer Verlag Lecture Notes in Computer Science (1438), 1998, pp. 403-441.
Hai tao, “Pass-Go, a New Graphical Password Scheme”, Master Thesis, University of Ottawa Canada, June 2006.
J. Goldberg, J. Hagman, and V. Sazawal, “Doodling our way to better authentication”, (student poster), In ACM Conference on Human Factors in Computing Systems (CHI), April 2002.
C. Varenhorst, “Passdoodles: A lightweight authentication method’, MIT Research Science Institute, July 2004.
H. Gao, X. Guo, X. Chen, L. Wang, and X. Liu, “YAGP: Yet another graphical password strategy”, In Annual Computer Security Applications Conference, 2008.
M. Orozco, B. Malek, M. Eid, and A. El Saddik, “Haptic-based sensible graphical password”, In Proceedings of Virtual Concept, 2006.
Barwal, R. K. ., Raheja, N. ., Mohan, B. R. ., U, Y. ., Gadde, S. S. ., & Patil, M. . (2023). Analysis and Classification of Breast Cancer Disease Via Different Datasets and Classifier Models. International Journal on Recent and Innovation Trends in Computing and Communication, 11(3s), 135–143. https://doi.org/10.17762/ijritcc.v11i3s.6174
Yathiraju, D. . (2022). Blockchain Based 5g Heterogeneous Networks Using Privacy Federated Learning with Internet of Things. Research Journal of Computer Systems and Engineering, 3(1), 21–28. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/37
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.