Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Dyanamic Pattern Generation using Picture Dataset for Secure Authentication

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Madhana Kumari, Meghana Nene, Pratiksha Nikam, Ashwini Gurne
10.5120/ijca2017912978

Madhana Kumari, Meghana Nene, Pratiksha Nikam and Ashwini Gurne. Dyanamic Pattern Generation using Picture Dataset for Secure Authentication. International Journal of Computer Applications 160(2):27-30, February 2017. BibTeX

@article{10.5120/ijca2017912978,
	author = {Madhana Kumari and Meghana Nene and Pratiksha Nikam and Ashwini Gurne},
	title = {Dyanamic Pattern Generation using Picture Dataset for Secure Authentication},
	journal = {International Journal of Computer Applications},
	issue_date = {February 2017},
	volume = {160},
	number = {2},
	month = {Feb},
	year = {2017},
	issn = {0975-8887},
	pages = {27-30},
	numpages = {4},
	url = {http://www.ijcaonline.org/archives/volume160/number2/27047-2017912978},
	doi = {10.5120/ijca2017912978},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Graphical password is in the foremost level than textual password. It overcomes the vulnerabilities of cracking password through various types of attacks. Graphical password is more secure than password in the form of text. It provides more memorable password than alphanumeric password which can reduce the burden on brain of user. It protects cloud data from shoulder surfing attack. Psychological study says that human can easily remember images than text, Hence graphical passwords are easy to remember and difficult to guess whereas textual passwords are difficult to remember and easy to guess. In Graphical password authentication technique images are used for authentication instead of texts. It combines recognition and recall based approach.

References

  1. Shraddha M. Gurav, Prathmey k.Rane, Nilesh R. Khochare, Leena S. Gawade, “Graphical password authentication for cloud
  2. Securing scheme” in 2014 IEEE International Conference on Electronic Systems, Signal Processing and Computing Technologies
  3. Mrs.Aakansha, “The Shoulder Surfing Resistant Graphical Password Authentication Technique” in 2016 ScienceDirect
  4. Julian Fierrez, “Graphical Password-Based User Authentication with Free-Form Doodles” in 2016 IEEE transactions on human-machine Systems, VOL. 46, NO. 4, AUGUST 2016
  5. Karmajit Petra, “Cued-Click Point Graphical Password Using Circular Tolerance to Increase Password Space and Persuasive Features” in 2016 Science direct
  6. Pawar Poonam, “Graphical Password Authentication with Cloud Securing Method” in 2015 International Journal of Multidisciplinary Research and Development 2015; 2(3): 763-76

Keywords

Authorization, Graphical Password, Security, Shoulder surfing, cloud access, GUA