A Robust Graphical-Based Authentication for Knowledge Level Using Persuasive Cued Click Points
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Information Technology | India | Volume 2 Issue 10, October 2013

A Robust Graphical-Based Authentication for Knowledge Level Using Persuasive Cued Click Points

S. Subadra, S. Ushanandhini

The graphical based technique is mainly used for authentication purpose. The purpose of this paper is increasing the security space and usability and avoiding the weakness of conventional password. The graphical based password technique uses persuasive cued click point. This persuasive Cued click points was designed to reduce patterns and reduce the usefulness of hotspots for attackers. An important usability goal for authentication systems is to support users in selecting better passwords, thus increasing security by expanding the effective password space. In click-based graphical passwords, poorly chosen passwords lead to the emergence of hotspots. The graphical password technique use robust discretization method, this discrete method is used to determine a click points tolerance square &corresponding grid. The click-based graphical passwords, encourage users to select more random, and hence more difficult to guess, click-points.

Keywords: Authentication, Graphical password, Persuasive technology, Persuasive cued click point

Edition: Volume 2 Issue 10, October 2013

Pages: 242 - 246

Share this Article

How to Cite this Article?

S. Subadra, S. Ushanandhini, "A Robust Graphical-Based Authentication for Knowledge Level Using Persuasive Cued Click Points", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013366, Volume 2 Issue 10, October 2013, 242 - 246

90 PDF Views | 71 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Authentication'

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1892 - 1895

Securing Data in Cloud Using Homomorphic Encryption

Honey Patel, Jasmin Jha

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 9, September 2015

Pages: 1458 - 1459

Remote Voting System Using Extended Visual Cryptography

Tridib Chakraborty, Mizan Md Chowdhury

Share this Article

Survey Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 1307 - 1311

A Survey on Authentication Techniques and User Recognition

Vyanktesh Dorlikar, Anjali Chandavale

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1470 - 1474

Role Based Encryption with Efficient Access Control in Cloud Storage

G. V. Bandewar, R. H. Borhade

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 747 - 750

A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes

Mokal P. H., Devikar R. N.

Share this Article

Similar Articles with Keyword 'Graphical password'

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 2032 - 2036

A Survey on CAPTCHA as Graphical Password

Priti P. Doke, S.A Nagtilak

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 747 - 750

A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes

Mokal P. H., Devikar R. N.

Share this Article

Survey Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 2128 - 2131

A Comprehensive Survey on CAPTCHA and VRP

Vijayalaxmi Daundkar, Prashant Kumbharkar

Share this Article

Research Paper, Information Technology, India, Volume 6 Issue 4, April 2017

Pages: 1808 - 1811

Enhancing 3 Level Security using 3D Password

Divya Prem Chandran, Sailee Sunil Rajeshirke

Share this Article

Research Paper, Information Technology, India, Volume 2 Issue 10, October 2013

Pages: 242 - 246

A Robust Graphical-Based Authentication for Knowledge Level Using Persuasive Cued Click Points

S. Subadra, S. Ushanandhini

Share this Article
Top