System Security Using 3-Dimensional Password
Keywords:
Computer World, text-based passwords, Graphical passwords, Advanced Encryption Standard, Persuasive cued click pointsAbstract
The purpose of this paper is increasing the safety house and avoiding the weakness of typical word. pc world surroundings authentication plays a vital role for word. User authentication is one amongst the foremost vital procedures needed to access secure and confidential information. Authentication of users is sometimes achieved through text-based passwords. Therefore researchers of recent days have gone for different strategies wherever in graphical image square measure used as a word. Image based mostly authentication permits user to form graphical word that has benefits over text-based passwords. Graphical passwords are designed to form passwords a lot of unforgettable and easier for folks to use. Persuasive Technology is employed to guide user’s alternative in click-based graphical passwords, exalting users to pick out a lot of random and therefore harder to guess click-points. during this paper, we've modified the method of clicking on the photographs and to form the word safer Advanced secret writing normal (AES) technique is employed so authentication are often come safer and word will be generated, attested & protected simply. This Paper is enhance the safety, a user has got to decide a sequence for the photographs used throughout registration.
References
Smita Chaturvedi ,Rekha Sharma. Securing Text & Image Password Using the Combinations Of Persuasive Cued Click Points with improved Advanced Encrpytion Standard ELSEVIER Procedia Computer Science 45(2015) 418-427.
Ahmad Almulhem.A Graphical Password Authentication System.978-0-9564263/6@2011 IEEE,pp.223-225,2011
P. C. van Oorschot, A. Salehi-Abari, and J. Thorpe. Purely automated attacks on passpoints-style graphical password. IEEEE Trans. Info. Forensics and security, vol. 5, no. 3, pp. 393-405, 2011
K. Golofit. Click password under investigation. 12th European Symposium On Research In Computer Security, LNCS 4734, Sept 2007.
S. Chiasson, A. Forget, R. Biddle, and P. C. van Oorschot. User interface design affects security: Patterns in click-based graphical passwords. International Journal of Information Security, Springer, 8(6):387-398, 2009
S.Chiasson, A. Forget, and R. Biddle. Graphical password authentication using cued click points. Symposium On Research in Computer Security (ESORICS), LNCS 4734, September 2007, pp. 359-374.
A. Dirik, N. Menon, and J. Bireget. Modeling user choice in the passpoints graphical password scheme,. In 3rd ACM Symposium on Usable Privacy and Security (SOUPS), July 2007.
Alankrita Ladage, Swapnil Gaikwad, Prof. A. B. Chougule. Graphical Based Password Authentication. International Journal of Engineering and Technology, vol. 2, Issue 4, April 2013.
Nelson, D. L., Reed, U.S., and Walling, J. R. Pictorial Superiority Effects. Journal of Experimental Psychology. Human Learing and Memory 2(5), 523-528, 1976.
Karthhik. K, Keerthana. R, Porkodi.A, Udhayakumar. S, Kesavan. S, Mr. Balamurugan. P.Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points. International Jounral of Computer Science and Mobile Computing.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2015 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.