CFP last date
22 April 2024
Reseach Article

An Overview: Passwords using Text, Color and Images Techniques Discussion, Implementation and Comparison

Published on December 2014 by Pardeshi Sachin N, Vipul D. Panjabi
National Conference on Emerging Trends in Computer Technology
Foundation of Computer Science USA
NCETCT - Number 1
December 2014
Authors: Pardeshi Sachin N, Vipul D. Panjabi
8ed5b4c8-0893-4377-a849-1a86d8e2951b

Pardeshi Sachin N, Vipul D. Panjabi . An Overview: Passwords using Text, Color and Images Techniques Discussion, Implementation and Comparison. National Conference on Emerging Trends in Computer Technology. NCETCT, 1 (December 2014), 27-30.

@article{
author = { Pardeshi Sachin N, Vipul D. Panjabi },
title = { An Overview: Passwords using Text, Color and Images Techniques Discussion, Implementation and Comparison },
journal = { National Conference on Emerging Trends in Computer Technology },
issue_date = { December 2014 },
volume = { NCETCT },
number = { 1 },
month = { December },
year = { 2014 },
issn = 0975-8887,
pages = { 27-30 },
numpages = 4,
url = { /proceedings/ncetct/number1/19082-4016/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Emerging Trends in Computer Technology
%A Pardeshi Sachin N
%A Vipul D. Panjabi
%T An Overview: Passwords using Text, Color and Images Techniques Discussion, Implementation and Comparison
%J National Conference on Emerging Trends in Computer Technology
%@ 0975-8887
%V NCETCT
%N 1
%P 27-30
%D 2014
%I International Journal of Computer Applications
Abstract

Textual passwords are the widespread method used for confirmation. But textual passwords are defenseless to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as substitute techniques to textual passwords. Most of the graphical schemes are susceptible to shoulder surfing. To tackle this problem, text can be combined with images or colors to create passwords for authentication. In this paper, we discussed technique to generate passwords using text, colors and images which are opposing to shoulder surfing. These methods are suitable for Personal Digital Assistants.

References
  1. R. Dhamija, and A. Perrig. "Déjà Vu: A User Study Using Images for Authentication". In 9th USENIX Security Symposium, 2000.
  2. Real User Corporation: Passfaces. www. passfaces. com
  3. Jermyn, I. , Mayer A. , Monrose, F. , Reiter, M. , and Rubin. , "The design and analysis of graphical passwords" in Proceedings of USENIX Security Symposium, August 1999.
  4. A. F. Syukri, E. Okamoto, and M. Mambo, "A User Identification System Using Signature Written with Mouse," in Third Australasian Conference on Information Security and Privacy (ACISP): Springer-
  5. Verlag Lecture Notes in Computer Science (1438), 1998, pp. 403-441.
  6. G. E. Blonder, "Graphical passwords," in Lucent Technologies, Inc. , Murray Hill, NJ, U. S. Patent, Ed. United States, 1996.
  7. Passlogix, site http://www. passlogix. com.
  8. Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang Liu Uwe Aickelin, "A New Graphical Password Scheme Resistant to Shoulder-Surfing
  9. S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, N. Memon, "Design and longitudinal evaluation of a graphical password system". International J. of Human-Computer Studies 63 (2005) 102-127.
  10. W. Jansen, "Authenticating Mobile Device User through Image Selection," in Data Security, 2004.
  11. W. Jansen, "Authenticating Users on Handheld Devices "in Proceedings of Canadian Information Technology Security Symposium, 2003.
  12. D. Weinshall and S. Kirkpatrick, "Passwords You'll Never Forget, but Can't Recall," in Proceedings of Conference on Human Factors in Computing Systems (CHI). Vienna, Austria: ACM, 2004, pp. 1399-1402.
  13. J. Goldberg, J. Hagman, V. Sazawal, "Doodling Our Way To Better Authentication", CHI '02 extended abstracts on Human Factors in Computer Systems, 2002.
  14. H. Zhao and X. Li, "S3PAS: A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme," in 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW 07), vol. 2. Canada, 2007, pp. 467-472.
  15. S. Man, D. Hong, and M. Mathews, "A shoulder surfing resistant graphical password scheme," in Proceedings of International conference on security and management. Las Vegas, NV, 2003.
  16. X. Suo, Y. Zhu and G. Owen, "Graphical Passwords: A Survey". In Proc. ACSAC'05.
  17. Z. Zheng, X. Liu, L. Yin, Z. Liu "A Hybrid password authentication scheme based on shape and text" Journal of Computers, vol. 5, no. 5 May 2010.
  18. Suwarna Jungari, Vrushali Bhujbal, Shital Sonawane, Supriya Bhujbal, Prof. Shital Salve,"Authentication Session Password Scheme Using Texts And Color" International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014, pp. 3355-3358.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Session Passwords Shoulder Surfing