CFP last date
20 June 2024
Reseach Article

Authentication System with Graphical Security and Sound Signature

by Vikram Verma, Shilpi Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 66 - Number 5
Year of Publication: 2013
Authors: Vikram Verma, Shilpi Sharma
10.5120/11079-6020

Vikram Verma, Shilpi Sharma . Authentication System with Graphical Security and Sound Signature. International Journal of Computer Applications. 66, 5 ( March 2013), 13-16. DOI=10.5120/11079-6020

@article{ 10.5120/11079-6020,
author = { Vikram Verma, Shilpi Sharma },
title = { Authentication System with Graphical Security and Sound Signature },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 66 },
number = { 5 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 13-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume66/number5/11079-6020/ },
doi = { 10.5120/11079-6020 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:21:32.563267+05:30
%A Vikram Verma
%A Shilpi Sharma
%T Authentication System with Graphical Security and Sound Signature
%J International Journal of Computer Applications
%@ 0975-8887
%V 66
%N 5
%P 13-16
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This document provides guidelines for implementing an authentication system which works on graphical password and includes sound signature. Click based graphical password provides security from brute force and dictionary attacks and they are not predictive thus it's not easy to breach them and a sound signature is integrated along with which enhances the security as this sound signature also under goes the password verification, and once the graphical password along with the sound signature is verified the user is allowed to log into the system.

References
  1. Integration of Sound Signature in Graphical Password Authentication System International Journal of Computer Applications (0975 – 8887) Volume 12– No. 9, January 2011
  2. R. Dhamija and A. Perrig, "Deja Vu: A User Study Using Images for Authentication," in Proceedings of 9th USENIX Security Symposium, 2000.
  3. Davis, D. , F. Monrose, and M. K. Reiter. On User Choice in Graphical Password Schemes. 13th USENIX Security Symposium, 2004.
  4. A. Perrig and D. Song, "Hash Visualization: A New Technique to Improve Real-World Security," in Proceedings of the 1999 International Workshop on Cryptographic Techniques and E-Commerce, 1999.
  5. D. Hong, S. Man, B. Hawes, and M. Mathews, "A password scheme strongly resistant to spyware," in Proceedings of International conference on security and management. Las Vergas, NV, 2004.
  6. RealUser, "www. realuser. com," last accessed in June 2005.
  7. T. Valentine, "An evaluation of the Passface personal authentication system," Technical Report, Goldsmiths College, University of London 1998.
  8. T. Valentine, "Memory for Passfaces after a Long Delay," Technical Report, Goldsmiths College, University of London 1999.
  9. S. Brostoff and M. A. Sasse, "Are Passfaces more usable than passwords: a field trial investigation," in People and Computers XIV - Usability or Else: Proceedings of HCI. Sunderland, UK: Springer-Verlag, 2000.
  10. D. Davis, F. Monrose, and M. K. Reiter, "On user choice in graphical password schemes," in Proceedings of the 13th Usenix Security Symposium. San Diego, CA, 2004.
  11. L. Sobrado and J. -C. Birget, "Graphical passwords," The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research, vol. 4, 2002.
  12. S. Man, D. Hong, and M. Mathews, "A shoulder-surfing resistant graphical password scheme," in Proceedings of International conference on security and management. Las Vegas, NV, 2003.
  13. I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, "The Design and Analysis of Graphical Passwords," in Proceedings of the 8th USENIX Security Symposium, 1999.
Index Terms

Computer Science
Information Sciences

Keywords

Cued click points sound signature authentication encryption