International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Information Technology | India | Volume 2 Issue 10, October 2013

A Robust Graphical-Based Authentication for Knowledge Level Using Persuasive Cued Click Points

S. Subadra, S. Ushanandhini

The graphical based technique is mainly used for authentication purpose. The purpose of this paper is increasing the security space and usability and avoiding the weakness of conventional password. The graphical based password technique uses persuasive cued click point. This persuasive Cued click points was designed to reduce patterns and reduce the usefulness of hotspots for attackers. An important usability goal for authentication systems is to support users in selecting better passwords, thus increasing security by expanding the effective password space. In click-based graphical passwords, poorly chosen passwords lead to the emergence of hotspots. The graphical password technique use robust discretization method, this discrete method is used to determine a click points tolerance square &corresponding grid. The click-based graphical passwords, encourage users to select more random, and hence more difficult to guess, click-points.

Keywords: Authentication, Graphical password, Persuasive technology, Persuasive cued click point

Edition: Volume 2 Issue 10, October 2013

Pages: 242 - 246


How to Cite this Article?

S. Subadra, S. Ushanandhini, "A Robust Graphical-Based Authentication for Knowledge Level Using Persuasive Cued Click Points", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013366, Volume 2 Issue 10, October 2013, 242 - 246

22 PDF Views | 15 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Authentication'

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 2120 - 2124

Verifier Based Prevention for an Offline Password Guessing Attack Using ECC

Radhika L. Bhosale, Manoj L. Bangare

Share this article

Survey Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 747 - 750

A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes

Mokal P. H., Devikar R. N.

Share this article

Research Paper, Information Technology, India, Volume 3 Issue 8, August 2014

Pages: 2009 - 2016

(t, n) Threshold Scheme to Enhance the Security of the Password Repository

Malladi Venkata Naga Kiranmai, Avinab Marahatta, K. Suresh Babu

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1043 - 104

Comparative Study of MAC Algorithms in Pervasive Computing Environment

P. Bakkiya Lakshmi, K. Kumar

Share this article

Research Paper, Information Technology, India, Volume 2 Issue 10, October 2013

Pages: 242 - 246

A Robust Graphical-Based Authentication for Knowledge Level Using Persuasive Cued Click Points

S. Subadra, S. Ushanandhini

Share this article

Similar Articles with Keyword 'Graphical password'

Survey Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 2128 - 2131

A Comprehensive Survey on CAPTCHA and VRP

Vijayalaxmi Daundkar, Prashant Kumbharkar

Share this article

Survey Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 747 - 750

A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes

Mokal P. H., Devikar R. N.

Share this article

Research Paper, Information Technology, India, Volume 2 Issue 10, October 2013

Pages: 242 - 246

A Robust Graphical-Based Authentication for Knowledge Level Using Persuasive Cued Click Points

S. Subadra, S. Ushanandhini

Share this article

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 2032 - 2036

A Survey on CAPTCHA as Graphical Password

Priti P. Doke, S.A Nagtilak

Share this article

Research Paper, Information Technology, India, Volume 6 Issue 4, April 2017

Pages: 1808 - 1811

Enhancing 3 Level Security using 3D Password

Divya Prem Chandran, Sailee Sunil Rajeshirke

Share this article

Top