Call for Paper - July 2020 Edition
IJCA solicits original research papers for the July 2020 Edition. Last date of manuscript submission is June 22, 2020. Read More

A Study of Various Passwords Authentication Techniques

IJCA Proceedings on International Conference on Advances in Science and Technology
© 2015 by IJCA Journal
ICAST 2014 - Number 3
Year of Publication: 2015
Aakansha Gokhale
Vijaya Waghmare

Aakansha Gokhale and Vijaya Waghmare. Article: A Study of Various Passwords Authentication Techniques. IJCA Proceedings on International Conference on Advances in Science and Technology ICAST 2014(3):1-5, February 2015. Full text available. BibTeX

	author = {Aakansha Gokhale and Vijaya Waghmare},
	title = {Article: A Study of Various Passwords Authentication Techniques},
	journal = {IJCA Proceedings on International Conference on Advances in Science and Technology},
	year = {2015},
	volume = {ICAST 2014},
	number = {3},
	pages = {1-5},
	month = {February},
	note = {Full text available}


Information and computer security is supported by passwords. Password is the principal part of authentication process. The traditional authentication method is to use text-based password which is also called alphanumeric password. But it has significant drawbacks. So to overcome vulnerabilities of this traditional password scheme a graphical password scheme is developed. But major drawback of graphical scheme is it is vulnerable to shoulder surfing attack and also sometimes to spyware attack. So alternative technique to graphical password a Captcha technique is developed. The major advantage of Captcha is that it can not be identified by bots. Captcha gives the protection from unwanted bots. Also there are some limitations of Captcha, and to overcome those after Captcha for more robust security a new technique is developed which is CaRP (Captcha as gRaphical Passwords). This paper will explore all the passwords techniques for security.


  • K. Renaud. "Evaluating authentication mechanisms". In L. Cranor and S. Garnkel, editors, Security and Usability: Designing Secure Systems That PeopleCanUse, chapter 6, pp. 103-128. O'Reilly Media, 2005.
  • A. Adams and M. A. Sasse. "Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures". Communications of the ACM, 42:41-46, 1999.
  • D. Feldmeier and P. Karn. "UNIX Password Security-Ten Years Later". In Crypto'89, August 1989.
  • R. Morris and K. Thompson. "Password Security: A Case History". Communications of the ACM,22(11):594-597, 1979.
  • D. Florencio and C. Herley. "A large-scale study of WWW password habits". In 16th ACM International World Wide Web Conference (WWW), May 2007.
  • A. Adams, M. A. Sasse, and P. Lunt. "Making passwords secure and usable". In HCI 97: Proceedings of HCI on People and Computers, pp. 1-19, London, UK, 1997. Springer-Verlag.
  • Xiaoyuan Suo, Ying Zhu, G. Scott. Owen, "Graphical Passwords: A Survey", Department of Computer Science Georgia State University
  • Blonder G. (1996) In Lucent Technologies, Inc. , Murray Hill, NJ, United States Patent 5559961.
  • R. Dhamija and A. Perrig, "Deja Vu: A User Study Using Images for Authentication," in Proceedings of 9 USENIX Security Symposiums, 2000.
  • Real User Corporation (2007) Passfaces T M , http//:www. realuser. com.
  • L. Sobrado and J. C. Birget, "Graphical passwords," The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research, vol. 4, 2002
  • I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, "The Design and Analysis of Graphical Passwords," in Proceedings of the 8th USENIX Security Symposium, 1999.
  • S. Sariou, S. D. Gribble, and H. M. Levy. Measurement and Analysis of Spyware in a University Environment. In Proceedings of the ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Francisco CA, 2004
  • D. Weinshall. Cognitive Authentication Schemes Safe Against Spyware. In Symposium on Security and Privacy, 2006.
  • J. Yan and A. S. El. Ahmad. Usability of CAPTCHAs - Or, Usability issues in CAPTCHA design. In the 4th Symposium on Usable Privacy and Security, Pittsburgh, USA, July 2008.
  • R. Lin, S. -Y. Huang, G. B. Bell, and Y. -K. Lee, "A new CAPTCHA interface design for mobile devices," in Proc. 12th Austral. User Inter. Conf. , 2011, pp. 3–8.
  • S. Chiasson, P. C. van Oorschot, and R. Biddle, "Graphical password authentication using cued click points," in Proc. ESORICS, 2007,pp. 359–374.