International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 111

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015


A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes

Dhanashree Chaudhari


Abstract: Data and PC security is upheld generally by passwords which are the guideline piece of the confirmation process. The most widely recognized PC confirmation technique is to utilize alphanumerical username and secret key which has critical downsides. To beat the vulnerabilities of customary routines, visual or graphical secret word plans have been created as could be expected under the circumstances elective answers for content based plan. A potential downside of graphical secret word plans is that they are more helpless against shoulder surfing than traditional alphanumeric content passwords. At the point when clients include their passwords in an open spot, they may be at danger of aggressors taking their watchword. An aggressor can catch a secret key by direct perception or by recording the singular's verification session. This is alluded to as shoulder surfing and is a known danger, of unique concern when confirming openly puts. In this paper we will show an overview on graphical secret key plans from 2005 till 2009 which are proposed to be safe against shoulder surfing assaults.


Keywords: Graphical Password, Shoulder Surfing, Authentication Scheme, Passwords, Graphical Authentication, Password Attacks


Edition: Volume 4 Issue 11, November 2015,


Pages: 2418 - 2422


How to Cite this Article?

Dhanashree Chaudhari, "A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=NOV151759, Volume 4 Issue 11, November 2015, 2418 - 2422

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Graphical Password'

Downloads: 103

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2137 - 2139

A Review of the Graphical Password Based Authentication Schemes

Shraddha S. Banne, Prof. Kishor N. Shedge

Share this Article

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Share this Article

Similar Articles with Keyword 'Shoulder Surfing'

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1048 - 1052

Authentication by Equalizing the Graphical Bars

Salim Istyaq

Share this Article

Downloads: 110

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2395 - 2399

Shoulder Surfing and Keylogger Resistance using Two Step Graphical Password Scheme

Dhanashree R. Chaudhari, Yogesh B. Gurav

Share this Article

Similar Articles with Keyword 'Authentication Scheme'

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this Article

Downloads: 103

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2137 - 2139

A Review of the Graphical Password Based Authentication Schemes

Shraddha S. Banne, Prof. Kishor N. Shedge

Share this Article

Similar Articles with Keyword 'Passwords'

Downloads: 89

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2067 - 2068

An Analysis of Mobile Applications Security; Issue and Aspects from the Users Perspective

Ashish A Kulkarni, Dr. Shivaji R. Madan

Share this Article

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

Similar Articles with Keyword 'Graphical Authentication'

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1048 - 1052

Authentication by Equalizing the Graphical Bars

Salim Istyaq

Share this Article

Downloads: 119

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 159 - 162

Access Control Model for Cloud Platforms Using Multi-Tier Graphical Authentication - A Review

Harvinder Singh, Er. Amandeep Kaur

Share this Article

Similar Articles with Keyword 'Password Attacks'

Downloads: 113

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1619 - 1622

A Comprehensive Survey on Various Graphical Password Schemas against Shoulder Surfing Attack

Shreyal Deshmukh, Priyanka More

Share this Article

Downloads: 118

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2016 - 2020

Implementation of Simple Text Based Shoulder Surfing Resistant Graphical Password using CAPTCHA and VRK

Vijayalaxmi Daundkar, Shyam Gupta

Share this Article

Similar Articles with Keyword 'Graphical'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 11, November 2021

Pages: 1044 - 1052

A Comprehensive Study of Various Sorting Algorithms

Cherukuri Nischay Sai

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 716 - 720

A Comprehensive Study of Elasticsearch

Nikita Kathare, O. Vinati Reddy, Dr. Vishalakshi Prabhu

Share this Article

Similar Articles with Keyword 'Password'

Downloads: 11

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 89

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2067 - 2068

An Analysis of Mobile Applications Security; Issue and Aspects from the Users Perspective

Ashish A Kulkarni, Dr. Shivaji R. Madan

Share this Article

Similar Articles with Keyword 'Shoulder'

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1048 - 1052

Authentication by Equalizing the Graphical Bars

Salim Istyaq

Share this Article

Downloads: 110

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2395 - 2399

Shoulder Surfing and Keylogger Resistance using Two Step Graphical Password Scheme

Dhanashree R. Chaudhari, Yogesh B. Gurav

Share this Article

Similar Articles with Keyword 'Surfing'

Downloads: 108

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2452 - 2457

A New Security Mechanism for Graphical Password Authentication using Combo Captcha in Video Technology

R. Buvanesvari, V. Prasath

Share this Article

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1048 - 1052

Authentication by Equalizing the Graphical Bars

Salim Istyaq

Share this Article

Similar Articles with Keyword 'Authentication'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'Scheme'

Downloads: 2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article
Top