A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Novel Hybrid Password Authentication Scheme Based on Text and Image
[chapter]
2018
Lecture Notes in Computer Science
We propose a hybrid authentication scheme integrating text and recognition-based graphical passwords. ...
Thus, we have carried out studies on mechanisms to enhance text passwords. These studies suggest that password space and memorability should be improved, with an additional mechanism based on images. ...
[22] also proposed a hybrid password scheme based on shape and text. ...
doi:10.1007/978-3-319-95729-6_12
fatcat:a5hgziw6n5gmzevmrr4wcrdupa
Multimedia Graphical Grid Based Text Password Authentication for Advanced User
2018
International Journal for Research in Applied Science and Engineering Technology
It is used to increase the reliability of password for advanced users by modifying a combination of text and graphical passwords. ...
This scheme is useful for secure authentication method for data protection on cloud and also in banking system. ...
Mohammad
Sarosh
Umar
and
Mohammad
QasimRafiq presented "A Novel Recognition-based
Graphical User Authentication Scheme".In that they
propose
a
novel
recognition-based
image
authentication ...
doi:10.22214/ijraset.2018.4806
fatcat:nx74wjseczemhkwbdxj35ij6q4
Development Status and Prospects of Graphical Password Authentication System in Korea
2019
KSII Transactions on Internet and Information Systems
As a result, password authentication methods are also changing. The authentication method most often used for security is password authentication. The most-commonly used passwords are text-based. ...
Graphical passwords are more difficult to steal than text-based passwords and are easier for users to remember. ...
The first one is a token-based authentication scheme, the second one is a biometric-based authentication scheme, and the third one is a knowledge-based authentication scheme. ...
doi:10.3837/tiis.2019.11.026
fatcat:2pkbdtiaqnftxot34wmb5kg57y
Literature Survey on Data Security using Carp Two Step Authentication based on Human and Hard AI Problems
IJARCCE - Computer and Communication Engineering
2015
IJARCCE
IJARCCE - Computer and Communication Engineering
This paper introduces image based CAPTCHA to protect user data or unauthorized access of information. Here the password is created from images and text password. ...
The Current system is based on only text password but it has some disadvantages like small password mostly used and easy to remember. ...
With a start we would like to thank god and also we wish to thank Pongalur N Palanichamy, Founder Chairman, Mrs. Indhu Murugesan, Managing Trustee, Mr. N Anbalagan, Director, Mr. ...
doi:10.17148/ijarcce.2015.4318
fatcat:ijwtx6syirh5der7r6kyql4wny
GRA-PIN: A Graphical and PIN-Based Hybrid Authentication Approach for Smart Devices
2022
Sensors
In the study, we have conducted a comparative study between the GRA-PIN scheme with existing PIN-based and pattern-based (swipe-based) authentications approaches using the standard Software Usability Scale ...
This paper describes an innovative, hybrid, and much more robust user authentication approach, named GRA-PIN (GRAphical and PIN-based), which combines the merits of both graphical and pin-based techniques ...
We have combined the pros of both text-based and graphical authentication techniques and proposed a hybrid approach. ...
doi:10.3390/s22041349
pmid:35214251
pmcid:PMC8962968
fatcat:u3byy6rehbbu3j7xr25ruwym3a
A Novel Hybrid Textual-Graphical Authentication Scheme with Better Security, Memorability, and Usability
2021
IEEE Access
The other mechanisms included a novel use of the drawmetric mechanism for setting the password to improve memorability, multistep authentication, a novel adaptation of one-time password (OTP) concept using ...
In this paper, we propose a textual-graphical hybrid authentication scheme that improves the security, memorability and usability inadequacies of existing authentication schemes. ...
[48] proposed a hybrid scheme based on a password shape and numbers. For password creation, a user draws a shape as in the DAS scheme. ...
doi:10.1109/access.2021.3069164
fatcat:jyqgeocv2zf43ft4tpeypyhym4
A Graphical Password Based System for Small Mobile Devices
[article]
2011
arXiv
pre-print
Passwords provide security mechanism for authentication and protection services against unwanted access to resources. A graphical based password is one promising alternatives of textual passwords. ...
In this paper, we have proposed a new hybrid graphical password based system, which is a combination of recognition and recall based techniques that offers many advantages over the existing systems and ...
[59] have proposed a hybrid authentication approach called Two-Step. In this scheme users continue to use text passwords as a first step but then must also enter a graphical password. ...
arXiv:1110.3844v1
fatcat:my2i7xiturejlagbf7wkq3eima
MULTI-MODE DATA SECURITY FOR SECRET COMMUNICATION
2015
International Journal of Research in Engineering and Technology
In this paper, algorithms for Image Cryptography, Image Steganography and Knowledge based Image CAPTCHA have been proposed to provide a one time communication. ...
The major goals of data security are Confidentiality, Integrity, and Authentication. Text based passwords are the most common methods used for authentication. ...
In order to conquer the limitations of text-based passwords, we propose a hybrid multi-mode authentication to strengthen text passwords by combining them with images for increased security. ...
doi:10.15623/ijret.2015.0418003
fatcat:t677wwv54felrjzi2iynpht4xm
An Enhanced Graphical Authentication Scheme Using Multiple-Image Steganography
2023
Computer systems science and engineering
Most remote systems require user authentication to access resources. Text-based passwords are still widely used as a standard method of user authentication. ...
This paper proposes an enhanced graphical authentication scheme, which comprises benefits over both recognition and recall-based graphical techniques besides image steganography. ...
The use of graphical passwords has been proposed to overcome text-based problems as a human can easily remember visual information than text strings [3] . ...
doi:10.32604/csse.2023.028975
fatcat:ezbc66tiijfdtbr76xtk3p2cq4
Multi-Factor Graphical Password for Cloud Interface Authentication Security
2015
International Journal of Computer Applications
The second level password is a 9 clue-points grid based password scheme for pattern passwords. The pattern password input grid is in the static arrangement and does not change at any point of time. ...
The proposed technique will be using onelevel double-trap image based authentication for the login protection in cloud platforms on mobile devices. ...
A novel multi-level and multi-dimensional method of authentication has been developed in this research using the combination of text, biometric and graphical password scheme. ...
doi:10.5120/ijca2015905957
fatcat:mebdgbuw25fbtal7qf7vdsgrci
A Novel Approach for Authenticating Textual or Graphical Passwords Using Hopfield Neural Network
[article]
2011
arXiv
pre-print
This study proposes the use of a Hopfield neural network technique for password authentication. ...
In this paper we discussed the Hopfield Network Scheme for Textual and graphical passwords, for which input Password will be converted in to probabilistic values. ...
ACKNOWLEDGEMENTS An assemblage of this nature could never have been attempted without reference to and inspiration from the works of others whose details are mentioned in reference section. ...
arXiv:1108.1434v1
fatcat:gzgdz7zfafbmbazqdsfgnp5wyq
Enhance Security Methods for Identifying Users without their Login Ids
2016
International Journal of Computer Applications
Authentication to a computer system is divided in to two mechanisms, identification and verification. For identification the login IDs have been used and for verification password can be used. ...
The existing password based system can be augmented by strengthening the identification process. ...
., in [2] , presents a novel approach for user authentication based on the keystroke dynamics of the password entry is introduced. ...
doi:10.5120/ijca2016911611
fatcat:bv727w2wkfeazazc5y3tioqp5u
Spin Wheel Based Graphical Password Authentication Resistant to Peeping Attack
2018
International Journal of Engineering & Technology
In this paper we introduce a novel spin wheel based authentication system targeting the touch screen based versatile and handheld gadgets. ...
The user needs to rotate a set of spin wheels to get authenticated .Usability Study was directed to investigate the ease of use and security of the proposed authentication mechanism. ...
To ensure the applications and information put away on cell phone's composing text based passwords on a virtual console can be dull. ...
doi:10.14419/ijet.v7i2.7.11607
fatcat:gagxdgr22venthsucpi5vtf5qq
A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices
2019
Sensors
In this paper a novel Fractal-Based Authentication Technique (FBAT) has been proposed by implementing a Sierpinski triangle. ...
Text-based passwords are the most common technique used for the authentication of devices, however, they are vulnerable to a certain type of attacks such as brute force, smudge and shoulder surfing attacks ...
Displayed random images are a combination of graphical and text-based images which are used to create a password. ...
doi:10.3390/s19030678
fatcat:zbzxdedrdbhe3jfqpmgcvnpnfy
Choose Your Own Authentication
2015
Proceedings of the New Security Paradigms Workshop on ZZZ - NSPW '15
To solve the long-standing problems users have in creating and remembering text passwords, a wide variety of alternative authentication schemes have been proposed. ...
We propose Choose Your Own Authentication (CYOA): a novel authentication architecture that enables users to choose a scheme amongst several available alternatives. ...
collection assistance, and Sarah Pearman for her proofing and formatting assistance. ...
doi:10.1145/2841113.2841114
dblp:conf/nspw/ForgetCB15
fatcat:45wnzmmhnzeupjy73vc7hbomcm
« Previous
Showing results 1 — 15 out of 1,876 results