System Security Using 3-Dimensional Password

Authors

  • Vikhe BB M.Tech Student, Dept of Computer Science Engg., RKDF School Of Engineering Indore, MP, India
  • Ahmad S Associate Professor, Dept of Computer Science Engg., RKDF School Of Engineering Indore, MP, India

Keywords:

Computer World, text-based passwords, Graphical passwords, Advanced Encryption Standard, Persuasive cued click points

Abstract

The purpose of this paper is increasing the safety house and avoiding the weakness of typical word. pc world surroundings authentication plays a vital role for word. User authentication is one amongst the foremost vital procedures needed to access secure and confidential information. Authentication of users is sometimes achieved through text-based passwords. Therefore researchers of recent days have gone for different strategies wherever in graphical image square measure used as a word. Image based mostly authentication permits user to form graphical word that has benefits over text-based passwords. Graphical passwords are designed to form passwords a lot of unforgettable and easier for folks to use. Persuasive Technology is employed to guide user’s alternative in click-based graphical passwords, exalting users to pick out a lot of random and therefore harder to guess click-points. during this paper, we've modified the method of clicking on the photographs and to form the word safer Advanced secret writing normal (AES) technique is employed so authentication are often come safer and word will be generated, attested & protected simply. This Paper is enhance the safety, a user has got to decide a sequence for the photographs used throughout registration.

References

Smita Chaturvedi ,Rekha Sharma. Securing Text & Image Password Using the Combinations Of Persuasive Cued Click Points with improved Advanced Encrpytion Standard ELSEVIER Procedia Computer Science 45(2015) 418-427.

Ahmad Almulhem.A Graphical Password Authentication System.978-0-9564263/6@2011 IEEE,pp.223-225,2011

P. C. van Oorschot, A. Salehi-Abari, and J. Thorpe. Purely automated attacks on passpoints-style graphical password. IEEEE Trans. Info. Forensics and security, vol. 5, no. 3, pp. 393-405, 2011

K. Golofit. Click password under investigation. 12th European Symposium On Research In Computer Security, LNCS 4734, Sept 2007.

S. Chiasson, A. Forget, R. Biddle, and P. C. van Oorschot. User interface design affects security: Patterns in click-based graphical passwords. International Journal of Information Security, Springer, 8(6):387-398, 2009

S.Chiasson, A. Forget, and R. Biddle. Graphical password authentication using cued click points. Symposium On Research in Computer Security (ESORICS), LNCS 4734, September 2007, pp. 359-374.

A. Dirik, N. Menon, and J. Bireget. Modeling user choice in the passpoints graphical password scheme,. In 3rd ACM Symposium on Usable Privacy and Security (SOUPS), July 2007.

Alankrita Ladage, Swapnil Gaikwad, Prof. A. B. Chougule. Graphical Based Password Authentication. International Journal of Engineering and Technology, vol. 2, Issue 4, April 2013.

Nelson, D. L., Reed, U.S., and Walling, J. R. Pictorial Superiority Effects. Journal of Experimental Psychology. Human Learing and Memory 2(5), 523-528, 1976.

Karthhik. K, Keerthana. R, Porkodi.A, Udhayakumar. S, Kesavan. S, Mr. Balamurugan. P.Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points. International Jounral of Computer Science and Mobile Computing.

Downloads

Published

2024-02-26

How to Cite

Vikhe, B. B., & Ahmad, S. (2024). System Security Using 3-Dimensional Password. COMPUSOFT: An International Journal of Advanced Computer Technology, 4(08), 1966–1969. Retrieved from https://ijact.in/index.php/j/article/view/345

Issue

Section

Original Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.