Authentication by Equalizing the Graphical Bars - Count
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 109

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 8, August 2016

Authentication by Equalizing the Graphical Bars

Salim Istyaq

Today, user authentication is one of the important topics in computer era. Powerful text-based password schemes could provide with certain degree of security. However, the fact that strong passwords are difficult to remember sometimes leads their own users to write them down on papers or even save them in a computer file. Graphical User Authentication (GUA) has been proposed as a possible alternative solution to text-based authentication, motivated particularly by the fact that humans can remember images better than text. In recent years, many networks, computer systems and Internet based environments try used graphical authentication technique for their customers logged in. All of graphical passwords have two different aspects which are usability and security. Different techniques for graphical systems have been proposed in literature over the past few years such as-Recognition Based Technique [2], Recall Based Technique [2]. This paper presents a survey of comparative study between different techniques of GUA.

Keywords: Matrix authentication, encoded format, shoulder surfing, authentication, graphical bars

Edition: Volume 5 Issue 8, August 2016

Pages: 1048 - 1052

Share this Article

How to Cite this Article?

Salim Istyaq, "Authentication by Equalizing the Graphical Bars", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20161066, Volume 5 Issue 8, August 2016, 1048 - 1052

Enter Your Email Address and Click Download Button



Similar Articles with Keyword 'shoulder surfing'

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1048 - 1052

Authentication by Equalizing the Graphical Bars

Salim Istyaq

Share this Article

Downloads: 110

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2395 - 2399

Shoulder Surfing and Keylogger Resistance using Two Step Graphical Password Scheme

Dhanashree R. Chaudhari, Yogesh B. Gurav

Share this Article

Downloads: 111

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2418 - 2422

A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes

Dhanashree Chaudhari

Share this Article

Downloads: 113

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1619 - 1622

A Comprehensive Survey on Various Graphical Password Schemas against Shoulder Surfing Attack

Shreyal Deshmukh, Priyanka More

Share this Article

Downloads: 118

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2016 - 2020

Implementation of Simple Text Based Shoulder Surfing Resistant Graphical Password using CAPTCHA and VRK

Vijayalaxmi Daundkar, Shyam Gupta

Share this Article

Similar Articles with Keyword 'authentication'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 99

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 1760 - 1762

A Survey on Existing Password Storage Methods and their Security

Samruddhi Patil, Kumud Wasnik

Share this Article

Downloads: 100

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this Article
Top