Research Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016
Shoulder Surfing and Keylogger Resistance using Two Step Graphical Password Scheme
Dhanashree R. Chaudhari, Yogesh B. Gurav
In todays world, we use most of the system where we require authentication process for security of sensitive information. Authentication process requires password which could be text password or graphical password. The main problem with text password is shoulder surfing. The shoulder surfing is a process carried out by a person where he can note clients password by observing his or her shoulder movement. The another problem with text password is it can be captured by camera recording. Hence to overcome the problem of shoulder surfing graphical password system is invented. It allows user to enter the password in a graphical instead by direct entering of text password. Hence in this paper we proposed an improved version of shoulder surfing resistant system by using region number. The second step is to enter the personal identification numbers (PINs) which is secure and usable practically which also recover the problem shoulder surfing attack. Here we are using key logger resistance also to avaoid the hacking.
Keywords: shoulder surfing, authentication, PIN, graphical password
Edition: Volume 5 Issue 6, June 2016
Pages: 2395 - 2399
How to Cite this Article?
Dhanashree R. Chaudhari, Yogesh B. Gurav, "Shoulder Surfing and Keylogger Resistance using Two Step Graphical Password Scheme", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART201629, Volume 5 Issue 6, June 2016, 2395 - 2399
125 PDF Views | 92 PDF Downloads
Similar Articles with Keyword 'shoulder surfing'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2418 - 2422A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes
Dhanashree Chaudhari
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 2395 - 2399Shoulder Surfing and Keylogger Resistance using Two Step Graphical Password Scheme
Dhanashree R. Chaudhari, Yogesh B. Gurav
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 1048 - 1052Authentication by Equalizing the Graphical Bars
Salim Istyaq
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016
Pages: 1619 - 1622A Comprehensive Survey on Various Graphical Password Schemas against Shoulder Surfing Attack
Shreyal Deshmukh, Priyanka More
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 570 - 575CaRP For User Authentication System Using Mobile Interface
Walanjkar Dipika Dattatraya, V. S. Nandedkar
Similar Articles with Keyword 'authentication'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2234 - 2237Analysis of Protective Mechanism in Roaming Network for Secure Communication
Ashwini A. Lokhande, Sonali U. Nimbhorkar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1845 - 1848A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1548 - 1550Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication
Chaitali P. Kathar, Vidya Dhamdhere
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1347 - 1350A QR-Code Authentication for Medical Image Access Environment
Inakollu Ramesh, K. B. V. Rama Narasimham
Similar Articles with Keyword 'PIN'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1751 - 1754Joining Delay; Packet Delivery and Limitations of EGMP
G. Anandhi, Dr. S. K. Srivatsa
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
Pages: 1626 - 1628Image Noise Reduction with Autoencoder using Tensor Flow
Jai Sehgal, Dr Yojna Arora
Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020
Pages: 1544 - 1554Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 297 - 300Balancing the Trade-Offs between Data Availability and Query Delay in MANETs
Umar I. Masumdar, N. S. Killarikar
Similar Articles with Keyword 'graphical password'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2137 - 2139A Review of the Graphical Password Based Authentication Schemes
Shraddha S. Banne, Prof. Kishor N. Shedge
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 852 - 855An Efficient User Authentication using Captcha and Graphical Passwords-A Survey
S. Karthika, Dr. P. Devaki
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1565 - 1567A Region Boundaries Algorithm for Ear Authentication Based on Plots
G. Harsha Vardhan, K. Jeeva
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1186 - 1188Online Password Guessing Attacks by Using Persuasive Cued Click Points
Priyanka A. Dadmode, Kiran I. Devadkar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 2452 - 2457A New Security Mechanism for Graphical Password Authentication using Combo Captcha in Video Technology
R. Buvanesvari, V. Prasath