Research Paper | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015
Authentication Using Text and Graphical Password
Mayur H Patel, Nimit S Modi
This paper introduces images based Graphical Password to protect user data or unauthorized access of information. In that password is created from images and text password. Current system is based on only text password but it has disadvantages small password mostly used and easy to remember. This type of password is easy to guess through different attack i.e. dictionary attack and brute force attack. In this paper we have proposed a new image password scheme. In this Recognition based technique is used with Alpha-Numerical password which provide more security and easy to remember text and graphical password.
Keywords: Brute force attack, Authentication, Graphical Password, images, security, dictionary attack
Edition: Volume 4 Issue 5, May 2015
Pages: 2302 - 2305
How to Cite this Article?
Mayur H Patel, Nimit S Modi, "Authentication Using Text and Graphical Password", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB154778, Volume 4 Issue 5, May 2015, 2302 - 2305
125 PDF Views | 106 PDF Downloads
Similar Articles with Keyword 'Brute force attack'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2302 - 2305Authentication Using Text and Graphical Password
Mayur H Patel, Nimit S Modi
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 893 - 898Design New Security Protocol against Online Password Guessing Attacks
Nitin. R. Shinde, S. K. Sonkar
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016
Pages: 1683 - 1686Review on Honey Encryption Technique
Nahri Syeda Noorunnisa, Dr. Khan Rahat Afreen
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013
Pages: 229 - 232Data Encryption and Decryption Process using PSR Methodology and Performance Analysis with RSA
P. Srinivasarao, B. Chaitanya, K. Venkatesh
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 83 - 85Avoiding Brute Force attack in MANET using Honey Encryption
Vinayak P P, Nahala M A
Similar Articles with Keyword 'Authentication'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2483 - 2487Accountability of Data usage in Cloud Computing
Nitin P. Doiphode, Hemlata Channe
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1833 - 1836A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing
Roshan M. Kawale, Bharti L. Dhote
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 842 - 845Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2338 - 2340Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device
Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar
Similar Articles with Keyword 'Graphical Password'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2137 - 2139A Review of the Graphical Password Based Authentication Schemes
Shraddha S. Banne, Prof. Kishor N. Shedge
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1565 - 1567A Region Boundaries Algorithm for Ear Authentication Based on Plots
G. Harsha Vardhan, K. Jeeva
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 2452 - 2457A New Security Mechanism for Graphical Password Authentication using Combo Captcha in Video Technology
R. Buvanesvari, V. Prasath
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1186 - 1188Online Password Guessing Attacks by Using Persuasive Cued Click Points
Priyanka A. Dadmode, Kiran I. Devadkar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2082 - 2086Graphical Password Knowledge Based Authentication System Enhancement Using Persuasive Technology
Prof. Uma Yadav, Sarita Sakure
Similar Articles with Keyword 'images'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1375 - 1390A Survey of Thinning Techniques on Two Dimensional Binary Images
Moumita Sarkar, Santanu Chatterjee
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
Pages: 1626 - 1628Image Noise Reduction with Autoencoder using Tensor Flow
Jai Sehgal, Dr Yojna Arora
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021
Pages: 1179 - 1182Face Detection Using Haar Cascade Classifiers
Bhavana R. Maale, Dr. Suvarna Nandyal
Research Paper, Computer Science & Engineering, Syria, Volume 10 Issue 3, March 2021
Pages: 524 - 528Detection and Classification of Skin Cancer using Image Processing Techniques
Maha Shawish, Balsam Eid
Student Project, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021
Pages: 1677 - 1680Detecting Pneumonia from X-Ray Images using Deep Learning
Deep Piyushkumar Patel
Similar Articles with Keyword 'security'
Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021
Pages: 139 - 144Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic
Senthuran Nallainathan
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020
Pages: 1544 - 1554Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 700 - 705Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects
Kale Jyoti S
Similar Articles with Keyword 'dictionary attack'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2302 - 2305Authentication Using Text and Graphical Password
Mayur H Patel, Nimit S Modi
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 893 - 898Design New Security Protocol against Online Password Guessing Attacks
Nitin. R. Shinde, S. K. Sonkar
Dissertation Chapters, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1716 - 1720To Secure Efficient Two-Server Password and Authenticate Key Exchange using Transaction Processing System against Dictionary Attack
Sonal Chandrakant Pansare, V. S. Nandedkar
Research Paper, Computer Science & Engineering, India, Volume 8 Issue 5, May 2019
Pages: 1815 - 1820Algorithm Feasibility on IoT Devices with Memory and Computational Power Constraints
Anusha Medavaka
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1156 - 1158Revisiting Defenses against Large-Scale Online Password Guessing Attacks
Ravi Kumar Yalagandala, Dr. N. Chandra Sekhar Reddy