International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064




Downloads: 113

Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 10, October 2016


A Comprehensive Survey on Various Graphical Password Schemas against Shoulder Surfing Attack

Shreyal Deshmukh [2] | Priyanka More [2]


Abstract: A massive security primitives depend on hard challenges that can be computationally solved only by mathematical algorithms operations. There are many drawback in alpha numeric passwords that they can be guessed very easily or can be hacked. So recently many researchers have proposed different graphical techniques such as CaRP, CAPTCHA, PCCP etc. This section makes a deep survey over the many existing systems and thereby make a comprehensive evaluation of the existing techniques making us ready to propose a new technique system which eliminate the drawbacks of the previous systems. The paper describe and studies different application oriented graphical systems proposed earlier and tries to find the loopholes to avoid the attacks.


Keywords: Password Attacks CaRP, OTP LTP, Captcha, Security, Graphical Password


Edition: Volume 5 Issue 10, October 2016,


Pages: 1619 - 1622


How to Cite this Article?

Shreyal Deshmukh, Priyanka More, "A Comprehensive Survey on Various Graphical Password Schemas against Shoulder Surfing Attack", International Journal of Science and Research (IJSR), Volume 5 Issue 10, October 2016, pp. 1619-1622, https://www.ijsr.net/get_abstract.php?paper_id=ART20162503

How to Share this Article?






Similar Articles with Keyword 'Captcha'

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan [3] | K. Jeeva

Share this Article

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2313 - 2317

Enhanced Phishing Detection based on Image Differentiation

B. Jenny Jyoshna | Shaik Nyamathulla [3]

Share this Article


Top