Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

6*6 Radom Color Grid Authentication (2 Step)

Author : Sudershan M 1 Veena Potdar 2 Madhu B 3

Date of Publication :8th June 2017

Abstract: Security in the computer is largely supported by passwords for authentication process. Use of alphanumeric passwords is the most common Authentication method. This conventional authentication method has been shown to have significant drawbacks. To overcome the vulnerabilities of traditional methods, numerous graphical password authentication systems have been proposed. These graphical passwords are usually seen as complex and time consuming. Furthermore, the existing graphical passwords are susceptible to spyware and shoulder surfing attacks. In this paper we propose this novel graphical password scheme to abolish well known security threats like brute force attacks, dictionary attacks, phishing attacks and spyware attacks.

Reference :

    1. G. Blonder. Graphical passwords. United States Patent 559961, 1996.
    2. K. Gilhooly, "Biometrics: Getting Back to Business," in Computerworld, May 09, 2005.
    3. A. Jain, L. Hong, and S. Pankanti, "Biometric identification," Communications of the ACM, vol. 33, pp. 168-176, 2000.
    4. Real User Corporation (2007) PassfacesTM,http://http//:www.realuser.com.
    5. Brostoff S. and Sasse M.A. In People and Computers XIV – Usability or Else: Proceedings of HCI. Sunderland, U.K, 2000.
    6. Sobrado L. and Birget J. (2007) http://rutgersscholar.rutgers.edu/volume04/sobrbirg/sobrbi rg.htm.
    7. S. Chiasson, P. van Oorschot, and R. Biddle, “Graphical password authentication using Cued Click Points,” in European Symposium On Research In Computer Security (ESORICS), LNCS 4734, September 2007, pp. 359–374.
    8. A. Forget, S. Chiasson, and R. Biddle, “Shoulder-surfing resistance with eye-gaze entry in click-based graphical passwords.” in ACM SIGCHI Conference on Human Factors in Computing Systems: Note (CHI), 2010
    9. A. Adams and M. A. Sasse, "Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures," Communications of the ACM, vol. 42, pp. 41-46, 1999.
    10. I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A.D. Rubin, "The Design and Analysis of Graphical Passwords," in Proceedings of the 8th USENIX Security Symposium, 1999.
    11. A. De Angeli, L. Coventry, G. Johnson, and K. Renaud, “Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems,” International Journal of Human-Computer Studies, vol. 63, no. 1-2, pp. 128–152, 2005.
    12. K. Renaud, “Guidelines for designing graphical authentication mechanism interfaces,” International Journal of Information and Computer Security, vol. 3, no. 1, pp. 60– 85, June 2009.
    13. K. Renaud, “Evaluating authentication mechanisms,” in Security and Usability: Designing Secure Systems That People Can Use, L. Cranor and S. Garfinkel, Eds. O’Reilly Media, 2005, ch. 6, pp. 103–128.
    14. C. Herley, P. van Oorschot, and A. Patrick, “Passwords: If Were So Smart, Why Are We Still Using Them?” in Financial Cryptography and Data Security, LNCS 5628, Springer, 2009

Recent Article