International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 109

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 8, August 2016

Authentication by Equalizing the Graphical Bars

Salim Istyaq

Today, user authentication is one of the important topics in computer era. Powerful text-based password schemes could provide with certain degree of security. However, the fact that strong passwords are difficult to remember sometimes leads their own users to write them down on papers or even save them in a computer file. Graphical User Authentication (GUA) has been proposed as a possible alternative solution to text-based authentication, motivated particularly by the fact that humans can remember images better than text. In recent years, many networks, computer systems and Internet based environments try used graphical authentication technique for their customers logged in. All of graphical passwords have two different aspects which are usability and security. Different techniques for graphical systems have been proposed in literature over the past few years such as-Recognition Based Technique [2], Recall Based Technique [2]. This paper presents a survey of comparative study between different techniques of GUA.

Keywords: Matrix authentication, encoded format, shoulder surfing, authentication, graphical bars

Edition: Volume 5 Issue 8, August 2016

Pages: 1048 - 1052

Share this Article

How to Cite this Article?

Salim Istyaq, "Authentication by Equalizing the Graphical Bars", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20161066, Volume 5 Issue 8, August 2016, 1048 - 1052

Enter Your Email Address


Similar Articles with Keyword 'shoulder surfing'

Downloads: 110

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2395 - 2399

Shoulder Surfing and Keylogger Resistance using Two Step Graphical Password Scheme

Dhanashree R. Chaudhari, Yogesh B. Gurav

Share this Article

Downloads: 111

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2418 - 2422

A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes

Dhanashree Chaudhari

Share this Article

Similar Articles with Keyword 'authentication'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'Matrix'

Downloads: 65

Research Paper, Computer Science & Engineering, China, Volume 10 Issue 1, January 2021

Pages: 1165 - 1168

A Capsule Robot Attitude Transformation Perception Method based on Intestinal Fold Features

Chengcheng Yan, Yanping Hu

Share this Article

Downloads: 82

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 165 - 167

Statistical Analysis of DCT Coefficients for Ascertaining Ears Biometrics

Nisha, Jatinder Kansal, JPS Raina

Share this Article
Top