A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 104

Survey Paper | Information Technology | India | Volume 3 Issue 4, April 2014

A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes

Mokal P. H., Devikar R. N.

For security authentication is important factor in any computer system. Authentication is the process of determining whether someone or something is in fact, who or what it is declared to be. In computer system authentication is done through use of password. The alphanumerical username and password is well known and commonly used authentication approach. As this approach is easiest one and provides security to some extent but it has some significant drawbacks such as if user selects short password which is easier to remember then it can be easily guessed or hacked by hackers and on the other side if user selects too long and difficult password then it is difficult for user to remember it for long time. To overcome the drawbacks of traditional authentication approach researcher have been developed new authentication approach as possible alternative to alphanumeric or text based approach. This new proposed approach uses images, pictures as a password known as Graphical password approach. The researcher have been designed Graphical passwords in such a way that passwords are easier for people to use, to create and so that more usable and secure. As graphical password provides security to certain degree but it is vulnerable to shoulder surfing attack. When user enters their password in public place then it can be capture by attacker by direct observation or by recording the users authentication session. This attach is known as Shoulder surfing attack. In this paper we will conduct comprehensive survey of existing shoulder surfing attacks in text based graphical password approach by studying five papers on shoulder surfing resistant graphical passwords and explains the problems and their possible solutions.

Keywords: Authentication approaches, Text based password, Graphical password, Shoulder surfing resistant, Key logger

Edition: Volume 3 Issue 4, April 2014

Pages: 747 - 750

Share this Article

How to Cite this Article?

Mokal P. H., Devikar R. N., "A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131590, Volume 3 Issue 4, April 2014, 747 - 750

Enter Your Email Address




Similar Articles with Keyword 'Graphical password'

Downloads: 109

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 2032 - 2036

A Survey on CAPTCHA as Graphical Password

Priti P. Doke, S.A Nagtilak

Share this Article

Downloads: 111

Survey Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 2128 - 2131

A Comprehensive Survey on CAPTCHA and VRP

Vijayalaxmi Daundkar, Prashant Kumbharkar

Share this Article

Similar Articles with Keyword 'Authentication'

Downloads: 1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3

Informative Article, Information Technology, India, Volume 10 Issue 7, July 2021

Pages: 63 - 81

Introduction to Cryptography

Bhavna Khosla

Share this Article

Similar Articles with Keyword 'approaches'

Downloads: 102

Research Paper, Information Technology, Iraq, Volume 4 Issue 11, November 2015

Pages: 1736 - 1745

Recommendations to Evaluate and Choose Cloud Services and Deployment Models for e-Business Strategic Use: A Case Study of Malaysian SMEs

Haider N. Hussain

Share this Article

Downloads: 102

Research Paper, Information Technology, India, Volume 5 Issue 7, July 2016

Pages: 1920 - 1924

Improving Stability, Smoothing and Diversifying of Recommender Systems

Sagar Sontakke, Pratibha Chavan

Share this Article

Similar Articles with Keyword 'Text'

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3

Informative Article, Information Technology, India, Volume 10 Issue 7, July 2021

Pages: 63 - 81

Introduction to Cryptography

Bhavna Khosla

Share this Article

Downloads: 102

Research Paper, Information Technology, India, Volume 1 Issue 3, December 2012

Pages: 171 - 173

Automatic Vehicles Number Plate Identification using Image Segmentation and Comparison Techniques

Gurjinder Pal Singh, Chhailadeep Kaur

Share this Article

Similar Articles with Keyword 'based'

Downloads: 178

Research Paper, Information Technology, Afghanistan, Volume 8 Issue 9, September 2019

Pages: 235 - 240

IT Based Land Suitability Modeling for Urban Development Using GIS: A Case Study of Kabul City, Afghanistan

Hazrat Mohammad Wahdaty

Share this Article

Downloads: 6

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 307 - 310

CCTV Cameras Hacking and Prevention Techniques

Preeti Rana

Share this Article

Similar Articles with Keyword 'password'

Downloads: 1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Downloads: 105

Survey Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 1307 - 1311

A Survey on Authentication Techniques and User Recognition

Vyanktesh Dorlikar, Anjali Chandavale

Share this Article

Similar Articles with Keyword 'Graphical'

Downloads: 106

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2073 - 2076

Healthcare Insurance Fraud Detection Leveraging Big Data Analytics

Prajna Dora, Dr. G. Hari Sekharan

Share this Article

Downloads: 109

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 2032 - 2036

A Survey on CAPTCHA as Graphical Password

Priti P. Doke, S.A Nagtilak

Share this Article

Similar Articles with Keyword 'Shoulder'

Downloads: 111

Survey Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 2128 - 2131

A Comprehensive Survey on CAPTCHA and VRP

Vijayalaxmi Daundkar, Prashant Kumbharkar

Share this Article

Downloads: 127

Research Paper, Information Technology, India, Volume 5 Issue 1, January 2016

Pages: 88 - 93

A Three Level Graphical Password Scheme for Providing High Degree of Security

Pranita H. Mokal, R. N. Denikar

Share this Article

Similar Articles with Keyword 'surfing'

Downloads: 106

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1865 - 1867

Survey on Cloud Computing Security Algorithms

Akash Kanthale, S. P. Potdar

Share this Article

Downloads: 111

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2923 - 2928

Hiding User Privacy in Location Based Services Through Clustering

Nilam V. Khandade, Snehal Nargundi

Share this Article

Similar Articles with Keyword 'resistant'

Downloads: 116

Research Paper, Information Technology, India, Volume 3 Issue 8, August 2014

Pages: 2009 - 2016

(t, n) Threshold Scheme to Enhance the Security of the Password Repository

Malladi Venkata Naga Kiranmai, Avinab Marahatta, K. Suresh Babu

Share this Article

Downloads: 127

Research Paper, Information Technology, India, Volume 5 Issue 1, January 2016

Pages: 88 - 93

A Three Level Graphical Password Scheme for Providing High Degree of Security

Pranita H. Mokal, R. N. Denikar

Share this Article

Similar Articles with Keyword 'Key'

Downloads: 57

Research Paper, Information Technology, Malaysia, Volume 10 Issue 1, January 2021

Pages: 889 - 896

Usage of Predictive Analytics during COVID-19 Pandemic to Support Administrative Decision Making in Health Care

Fatimetou Zahra Mohamed Mahmoud, Noor Azizah Mohamadali

Share this Article

Downloads: 87

Informative Article, Information Technology, Nigeria, Volume 2 Issue 4, April 2013

Pages: 468 - 473

A Superficial Expos of Data Warehousing: An Intrinsic Component of Modern Day Business Intelligence

Oyerinde, O.D, Adekunle, A. Y, Ebiesuwa, O.O

Share this Article



Top