Downloads: 1 | Views: 14
Survey Paper | Computer Engineering | India | Volume 11 Issue 2, February 2022
Graphical Passwords: Behind the Attainment of Goals
Vikas Nandwana | Pranit Nehete | Ashutosh Patil
Abstract: Users who enter their credentials in a public location risk having their passwords stolen by intruders. An attacker can steal a password by watching the individual's authentication session or recording it. Shoulder-surfing is a well-known risk, and it's especially dangerous while authenticating in public. Until recently, the user's awareness was the sole barrier against shoulder-surfing. Shoulder surfing resistant password authentication ensures that the user's authentication is not compromised by shoulder surfing. Because the user is never required to click directly on password symbols, it allows users to authenticate by inputting their password in a graphical manner in vulnerable areas. This mechanism's usability testing revealed that inexperienced users were able to correctly input and remember their graphical password.
Keywords: Image Selection, Extraction, Machine learning
Edition: Volume 11 Issue 2, February 2022,
Pages: 295 - 298
Similar Articles with Keyword 'Extraction'
Downloads: 0
Research Paper, Computer Engineering, India, Volume 11 Issue 10, October 2022
Pages: 706 - 712The Age of Financial Frauds and using Random Forest Machine Learning to Predict Fraudulent Transactions
Dilsher Singh
Downloads: 3
Survey Paper, Computer Engineering, India, Volume 10 Issue 11, November 2021
Pages: 668 - 671Investigation of Automatic Data Extraction Method from Complex Web Pages
Nitin More | Rupali A. Mangrule