Filters








1,876 Hits in 5.2 sec

A Novel Hybrid Password Authentication Scheme Based on Text and Image [chapter]

Ian Mackie, Merve Yıldırım
2018 Lecture Notes in Computer Science  
We propose a hybrid authentication scheme integrating text and recognition-based graphical passwords.  ...  Thus, we have carried out studies on mechanisms to enhance text passwords. These studies suggest that password space and memorability should be improved, with an additional mechanism based on images.  ...  [22] also proposed a hybrid password scheme based on shape and text.  ... 
doi:10.1007/978-3-319-95729-6_12 fatcat:a5hgziw6n5gmzevmrr4wcrdupa

Multimedia Graphical Grid Based Text Password Authentication for Advanced User

Tasnim Kausar
2018 International Journal for Research in Applied Science and Engineering Technology  
It is used to increase the reliability of password for advanced users by modifying a combination of text and graphical passwords.  ...  This scheme is useful for secure authentication method for data protection on cloud and also in banking system.  ...  Mohammad Sarosh Umar and Mohammad QasimRafiq presented "A Novel Recognition-based Graphical User Authentication Scheme".In that they propose a novel recognition-based image authentication  ... 
doi:10.22214/ijraset.2018.4806 fatcat:nx74wjseczemhkwbdxj35ij6q4

Development Status and Prospects of Graphical Password Authentication System in Korea

2019 KSII Transactions on Internet and Information Systems  
As a result, password authentication methods are also changing. The authentication method most often used for security is password authentication. The most-commonly used passwords are text-based.  ...  Graphical passwords are more difficult to steal than text-based passwords and are easier for users to remember.  ...  The first one is a token-based authentication scheme, the second one is a biometric-based authentication scheme, and the third one is a knowledge-based authentication scheme.  ... 
doi:10.3837/tiis.2019.11.026 fatcat:2pkbdtiaqnftxot34wmb5kg57y

Literature Survey on Data Security using Carp Two Step Authentication based on Human and Hard AI Problems
IJARCCE - Computer and Communication Engineering

R.G. Vetrivel, J.Vasanth Kishore, B. Arun Kumar, S. Thivaharan
2015 IJARCCE  
This paper introduces image based CAPTCHA to protect user data or unauthorized access of information. Here the password is created from images and text password.  ...  The Current system is based on only text password but it has some disadvantages like small password mostly used and easy to remember.  ...  With a start we would like to thank god and also we wish to thank Pongalur N Palanichamy, Founder Chairman, Mrs. Indhu Murugesan, Managing Trustee, Mr. N Anbalagan, Director, Mr.  ... 
doi:10.17148/ijarcce.2015.4318 fatcat:ijwtx6syirh5der7r6kyql4wny

GRA-PIN: A Graphical and PIN-Based Hybrid Authentication Approach for Smart Devices

Nabeela Kausar, Ikram Ud Din, Mudassar Ali Khan, Ahmad Almogren, Byung-Seo Kim
2022 Sensors  
In the study, we have conducted a comparative study between the GRA-PIN scheme with existing PIN-based and pattern-based (swipe-based) authentications approaches using the standard Software Usability Scale  ...  This paper describes an innovative, hybrid, and much more robust user authentication approach, named GRA-PIN (GRAphical and PIN-based), which combines the merits of both graphical and pin-based techniques  ...  We have combined the pros of both text-based and graphical authentication techniques and proposed a hybrid approach.  ... 
doi:10.3390/s22041349 pmid:35214251 pmcid:PMC8962968 fatcat:u3byy6rehbbu3j7xr25ruwym3a

A Novel Hybrid Textual-Graphical Authentication Scheme with Better Security, Memorability, and Usability

Shah Zaman Nizamani, Syed Raheel Hassan, Riaz Ahmed Shaikh, Ehab Atif Abozinadah, Rashid Mehmood
2021 IEEE Access  
The other mechanisms included a novel use of the drawmetric mechanism for setting the password to improve memorability, multistep authentication, a novel adaptation of one-time password (OTP) concept using  ...  In this paper, we propose a textual-graphical hybrid authentication scheme that improves the security, memorability and usability inadequacies of existing authentication schemes.  ...  [48] proposed a hybrid scheme based on a password shape and numbers. For password creation, a user draws a shape as in the DAS scheme.  ... 
doi:10.1109/access.2021.3069164 fatcat:jyqgeocv2zf43ft4tpeypyhym4

A Graphical Password Based System for Small Mobile Devices [article]

Wazir Zada Khan, Mohammed Y. Aalsalem, Yang Xiang
2011 arXiv   pre-print
Passwords provide security mechanism for authentication and protection services against unwanted access to resources. A graphical based password is one promising alternatives of textual passwords.  ...  In this paper, we have proposed a new hybrid graphical password based system, which is a combination of recognition and recall based techniques that offers many advantages over the existing systems and  ...  [59] have proposed a hybrid authentication approach called Two-Step. In this scheme users continue to use text passwords as a first step but then must also enter a graphical password.  ... 
arXiv:1110.3844v1 fatcat:my2i7xiturejlagbf7wkq3eima

MULTI-MODE DATA SECURITY FOR SECRET COMMUNICATION

Candida Paulette Alphonso .
2015 International Journal of Research in Engineering and Technology  
In this paper, algorithms for Image Cryptography, Image Steganography and Knowledge based Image CAPTCHA have been proposed to provide a one time communication.  ...  The major goals of data security are Confidentiality, Integrity, and Authentication. Text based passwords are the most common methods used for authentication.  ...  In order to conquer the limitations of text-based passwords, we propose a hybrid multi-mode authentication to strengthen text passwords by combining them with images for increased security.  ... 
doi:10.15623/ijret.2015.0418003 fatcat:t677wwv54felrjzi2iynpht4xm

An Enhanced Graphical Authentication Scheme Using Multiple-Image Steganography

Khalil Hamdi Ateyeh Al-Shqeerat
2023 Computer systems science and engineering  
Most remote systems require user authentication to access resources. Text-based passwords are still widely used as a standard method of user authentication.  ...  This paper proposes an enhanced graphical authentication scheme, which comprises benefits over both recognition and recall-based graphical techniques besides image steganography.  ...  The use of graphical passwords has been proposed to overcome text-based problems as a human can easily remember visual information than text strings [3] .  ... 
doi:10.32604/csse.2023.028975 fatcat:ezbc66tiijfdtbr76xtk3p2cq4

Multi-Factor Graphical Password for Cloud Interface Authentication Security

Ramandeep Kaur, Amanpreet Kaur
2015 International Journal of Computer Applications  
The second level password is a 9 clue-points grid based password scheme for pattern passwords. The pattern password input grid is in the static arrangement and does not change at any point of time.  ...  The proposed technique will be using onelevel double-trap image based authentication for the login protection in cloud platforms on mobile devices.  ...  A novel multi-level and multi-dimensional method of authentication has been developed in this research using the combination of text, biometric and graphical password scheme.  ... 
doi:10.5120/ijca2015905957 fatcat:mebdgbuw25fbtal7qf7vdsgrci

A Novel Approach for Authenticating Textual or Graphical Passwords Using Hopfield Neural Network [article]

ASN Chakravarthy, P S Avadhani, P. E. S. N Krishna Prasad, N.Rajeevand, D.Rajasekhar Reddy
2011 arXiv   pre-print
This study proposes the use of a Hopfield neural network technique for password authentication.  ...  In this paper we discussed the Hopfield Network Scheme for Textual and graphical passwords, for which input Password will be converted in to probabilistic values.  ...  ACKNOWLEDGEMENTS An assemblage of this nature could never have been attempted without reference to and inspiration from the works of others whose details are mentioned in reference section.  ... 
arXiv:1108.1434v1 fatcat:gzgdz7zfafbmbazqdsfgnp5wyq

Enhance Security Methods for Identifying Users without their Login Ids

Pallavi M., Girish Kumar
2016 International Journal of Computer Applications  
Authentication to a computer system is divided in to two mechanisms, identification and verification. For identification the login IDs have been used and for verification password can be used.  ...  The existing password based system can be augmented by strengthening the identification process.  ...  ., in [2] , presents a novel approach for user authentication based on the keystroke dynamics of the password entry is introduced.  ... 
doi:10.5120/ijca2016911611 fatcat:bv727w2wkfeazazc5y3tioqp5u

Spin Wheel Based Graphical Password Authentication Resistant to Peeping Attack

M Kameswara Rao, Dr S.G. Santhi, Dr Md.Ali Hussain
2018 International Journal of Engineering & Technology  
In this paper we introduce a novel spin wheel based authentication system targeting the touch screen based versatile and handheld gadgets.  ...  The user needs to rotate a set of spin wheels to get authenticated .Usability Study was directed to investigate the ease of use and security of the proposed authentication mechanism.  ...  To ensure the applications and information put away on cell phone's composing text based passwords on a virtual console can be dull.  ... 
doi:10.14419/ijet.v7i2.7.11607 fatcat:gagxdgr22venthsucpi5vtf5qq

A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices

Adnan Ali, Hamaad Rafique, Talha Arshad, Mohammed A. Alqarni, Sajjad Hussain Chauhdary, Ali Kashif Bashir
2019 Sensors  
In this paper a novel Fractal-Based Authentication Technique (FBAT) has been proposed by implementing a Sierpinski triangle.  ...  Text-based passwords are the most common technique used for the authentication of devices, however, they are vulnerable to a certain type of attacks such as brute force, smudge and shoulder surfing attacks  ...  Displayed random images are a combination of graphical and text-based images which are used to create a password.  ... 
doi:10.3390/s19030678 fatcat:zbzxdedrdbhe3jfqpmgcvnpnfy

Choose Your Own Authentication

Alain Forget, Sonia Chiasson, Robert Biddle
2015 Proceedings of the New Security Paradigms Workshop on ZZZ - NSPW '15  
To solve the long-standing problems users have in creating and remembering text passwords, a wide variety of alternative authentication schemes have been proposed.  ...  We propose Choose Your Own Authentication (CYOA): a novel authentication architecture that enables users to choose a scheme amongst several available alternatives.  ...  collection assistance, and Sarah Pearman for her proofing and formatting assistance.  ... 
doi:10.1145/2841113.2841114 dblp:conf/nspw/ForgetCB15 fatcat:45wnzmmhnzeupjy73vc7hbomcm
« Previous Showing results 1 — 15 out of 1,876 results