Graphical Password Authentication Techniques: A Review
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Review Papers | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015

Graphical Password Authentication Techniques: A Review

Aakansha Gokhale, Vijaya Waghmare

In todays IT world, for the computer and information security the user authentication and authorization play a significant role. For this authentication a password is very important aspect. The conventional method of password is a strong textual password which is also called as alphanumeric password. But because of the problem of memorability, users writing them down on the pieces of papers or kept the password which can be easily memorable. Because of this it is vulnerable to various attacks like brute force, dictionary attack, social engineering, keylogger, spyware, guessing. So to overcome this limitation of textual password, a new password technique is developed which is a Graphical Password.In this as name indicates the images are used as a password. Also psychological study says that images can be easily remembered by human beings as compare to text. Generally password has two essential aspects security and usability. In Graphical Password, the clicking and dragging activities are performed on the images rather than text. So it can be best alternative to the textual password. This paper will explore the strengths and limitations of various graphical password techniques on the basis of security and usability metrics.

Keywords: Authentication, Graphical Password, Security, Usability

Edition: Volume 4 Issue 7, July 2015

Pages: 279 - 285

Share this Article

How to Cite this Article?

Aakansha Gokhale, Vijaya Waghmare, "Graphical Password Authentication Techniques: A Review", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB156313, Volume 4 Issue 7, July 2015, 279 - 285

41 PDF Views | 42 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Authentication'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2452 - 2457

A New Security Mechanism for Graphical Password Authentication using Combo Captcha in Video Technology

R. Buvanesvari, V. Prasath

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2234 - 2237

Analysis of Protective Mechanism in Roaming Network for Secure Communication

Ashwini A. Lokhande, Sonali U. Nimbhorkar

Share this Article

Similar Articles with Keyword 'Graphical Password'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2452 - 2457

A New Security Mechanism for Graphical Password Authentication using Combo Captcha in Video Technology

R. Buvanesvari, V. Prasath

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2214 - 2217

An Adopted Multi-level Authentication Framework in Cloud Environment

Shaik Mujafar, K. B. V. Rama Narasimham

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2302 - 2305

Authentication Using Text and Graphical Password

Mayur H Patel, Nimit S Modi

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2137 - 2139

A Review of the Graphical Password Based Authentication Schemes

Shraddha S. Banne, Prof. Kishor N. Shedge

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1186 - 1188

Online Password Guessing Attacks by Using Persuasive Cued Click Points

Priyanka A. Dadmode, Kiran I. Devadkar

Share this Article

Similar Articles with Keyword 'Security'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'Usability'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2383 - 2384

Location Based Query Processing For Providing Privacy to Exploit Service Similarity: A Survey

Prerana Deokar, Praveen Barapatre

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1985 - 1988

Service Correspondent for Privacy in Location Based Data Retrieval

Prerana S. Deokar, Praveen Barapatre

Share this Article

Informative Article, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1688 - 1689

Exploring the Usability of Wearable Devices and Sensors in Automotive Industry

Challa Pradyumna

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2668 - 2671

Generic Test Automation

Vishal Sangave, Vaishali Nandedkar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1783 - 1786

Survey on Product Review Sentiment Analysis with Aspect Ranking

Harsha Patil, P. M. Mane

Share this Article
Top