A Robust Graphical-Based Authentication for Knowledge Level Using Persuasive Cued Click Points
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 120 | Monthly Hits: ⮙11

Research Paper | Information Technology | India | Volume 2 Issue 10, October 2013

A Robust Graphical-Based Authentication for Knowledge Level Using Persuasive Cued Click Points

S. Subadra, S. Ushanandhini

The graphical based technique is mainly used for authentication purpose. The purpose of this paper is increasing the security space and usability and avoiding the weakness of conventional password. The graphical based password technique uses persuasive cued click point. This persuasive Cued click points was designed to reduce patterns and reduce the usefulness of hotspots for attackers. An important usability goal for authentication systems is to support users in selecting better passwords, thus increasing security by expanding the effective password space. In click-based graphical passwords, poorly chosen passwords lead to the emergence of hotspots. The graphical password technique use robust discretization method, this discrete method is used to determine a click points tolerance square &corresponding grid. The click-based graphical passwords, encourage users to select more random, and hence more difficult to guess, click-points.

Keywords: Authentication, Graphical password, Persuasive technology, Persuasive cued click point

Edition: Volume 2 Issue 10, October 2013

Pages: 242 - 246

Share this Article

How to Cite this Article?

S. Subadra, S. Ushanandhini, "A Robust Graphical-Based Authentication for Knowledge Level Using Persuasive Cued Click Points", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013366, Volume 2 Issue 10, October 2013, 242 - 246

Enter Your Registered Email Address





Similar Articles with Keyword 'Authentication'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Survey Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 747 - 750

A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes

Mokal P. H., Devikar R. N.

Share this Article

Downloads: 105 | Weekly Hits: ⮙4 | Monthly Hits: ⮙10

Survey Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 1307 - 1311

A Survey on Authentication Techniques and User Recognition

Vyanktesh Dorlikar, Anjali Chandavale

Share this Article

Downloads: 105 | Weekly Hits: ⮙2

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1892 - 1895

Securing Data in Cloud Using Homomorphic Encryption

Honey Patel, Jasmin Jha

Share this Article

Downloads: 106 | Monthly Hits: ⮙5

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1865 - 1867

Survey on Cloud Computing Security Algorithms

Akash Kanthale, S. P. Potdar

Share this Article

Similar Articles with Keyword 'Graphical password'

Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Survey Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 747 - 750

A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes

Mokal P. H., Devikar R. N.

Share this Article

Downloads: 108 | Weekly Hits: ⮙1 | Monthly Hits: ⮙6

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 2032 - 2036

A Survey on CAPTCHA as Graphical Password

Priti P. Doke, S.A Nagtilak

Share this Article

Downloads: 110 | Weekly Hits: ⮙3 | Monthly Hits: ⮙6

Survey Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 2128 - 2131

A Comprehensive Survey on CAPTCHA and VRP

Vijayalaxmi Daundkar, Prashant Kumbharkar

Share this Article

Downloads: 113 | Weekly Hits: ⮙2

Research Paper, Information Technology, India, Volume 6 Issue 4, April 2017

Pages: 1808 - 1811

Enhancing 3 Level Security using 3D Password

Divya Prem Chandran, Sailee Sunil Rajeshirke

Share this Article

Downloads: 120 | Monthly Hits: ⮙11

Research Paper, Information Technology, India, Volume 2 Issue 10, October 2013

Pages: 242 - 246

A Robust Graphical-Based Authentication for Knowledge Level Using Persuasive Cued Click Points

S. Subadra, S. Ushanandhini

Share this Article



Top