International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 168

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 7, July 2017


Implementation of VSK and Arithmetic OTP Verification for Resisting Shoulder Surfing Attack

Shreyal Deshmukh, Priyanka More


Abstract: Currently Cyber security is an important issue to tackle. A wide security primitive depend on hard challenges that can be computationally solved only by mathematical algorithms operations. Different user authentication methods are used for this purpose. There are many drawbacks in alphanumeric passwords that they can be guessed very easily or can be hacked. Currently researchers have proposed different graphical techniques such as CAPTCHA, PCCP, CaRP, PassMatrix, VRK, OTP & LTP etc. In this paper, we present a new security primitive based on hard AI problems, namely, a novel family of graphical password systems built on top of Captcha technology, which we call Captcha as graphical passwords (CaRP). CaRP is both a graphical password and a Captcha scheme. CaRP addresses a number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual-view technologies, shoulder-surfing attacks. This section makes a deep survey over the many existing systems and thereby makes a comprehensive evaluation of the existing techniques making us ready to propose a new technique system which eliminate the drawbacks of the previous systems. The paper describes and studies different application oriented graphical systems proposed earlier and tries to find the loopholes to avoid the attacks.


Keywords: Password Attacks, CaRP, OTP, LTP, Captcha, Security, Graphical Password


Edition: Volume 6 Issue 7, July 2017,


Pages: 20 - 24


How to Cite this Article?

Shreyal Deshmukh, Priyanka More, "Implementation of VSK and Arithmetic OTP Verification for Resisting Shoulder Surfing Attack", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART20174845, Volume 6 Issue 7, July 2017, 20 - 24

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Password Attacks'

Downloads: 111

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2418 - 2422

A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes

Dhanashree Chaudhari

Share this Article

Downloads: 113

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1619 - 1622

A Comprehensive Survey on Various Graphical Password Schemas against Shoulder Surfing Attack

Shreyal Deshmukh, Priyanka More

Share this Article

Similar Articles with Keyword 'CaRP'

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Share this Article

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 994 - 997

Content Based Image Retrieval: Bone Age Assessment

Manjula Gururaj H, Dr. G. S. Nagaraja

Share this Article

Similar Articles with Keyword 'OTP'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Downloads: 109

Research Paper, Computer Science & Engineering, India, https://www.ijsr.net/issue.php?edition=Volume%203%20Issue%208,%20August%20201

Pages: 1167 - 1172

Protection against Multi-Id Generation Autobots/Botnets Using Using Colored Visually Encoded OTPs Generated by the Random Function in the Spherical Space

Taranpreet Kaur, Harmandeep Singh

Share this Article

Similar Articles with Keyword 'LTP'

Downloads: 109

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 930 - 932

Effective Approach to Detection of Password File Using Honeywords

Dipali Dhumal, Shyam Gupta

Share this Article

Downloads: 113

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1619 - 1622

A Comprehensive Survey on Various Graphical Password Schemas against Shoulder Surfing Attack

Shreyal Deshmukh, Priyanka More

Share this Article

Similar Articles with Keyword 'Captcha'

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Share this Article

Downloads: 108

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2452 - 2457

A New Security Mechanism for Graphical Password Authentication using Combo Captcha in Video Technology

R. Buvanesvari, V. Prasath

Share this Article

Similar Articles with Keyword 'Security'

Downloads: 115 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 134 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Similar Articles with Keyword 'Graphical Password'

Downloads: 103

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2137 - 2139

A Review of the Graphical Password Based Authentication Schemes

Shraddha S. Banne, Prof. Kishor N. Shedge

Share this Article

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Share this Article

Similar Articles with Keyword 'Password'

Downloads: 11 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 89

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2067 - 2068

An Analysis of Mobile Applications Security; Issue and Aspects from the Users Perspective

Ashish A Kulkarni, Dr. Shivaji R. Madan

Share this Article

Similar Articles with Keyword 'Attacks'

Downloads: 134 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article
Top