Computer security depends for the most part on passwords to attest human users from attackers. The foremost common computer authentication technique is to use alphanumerical usernames and passwords. However, this technique has been shown to possess important drawbacks, as an example, users tend to select passwords that may be simply guessed. On the opposite hand, if a word is tough to guess, then it's usually exhausting to recollect. To handle this drawback, some researchers have developed authentication ways that use photos as passwords. During this paper, we have a tendency to conduct a comprehensive survey of the prevailing graphical password techniques and supply an attainable theory of our own. Human factors are usually thought-about the weakest link in a very pc security system. If we have a tendency to means that there are 3 major areas wherever human-computer interaction is important: authentication, security operations, and developing secure systems. Here we have a tendency to specialize in the authentication drawback. User authentication may be an elementary part in most pc security contexts. Graphical passwords consult with exploitation pictures (also drawings) as passwords. In theory, graphical passwords are easier to recollect, since humans keep in mind photos higher than words. Also, they ought to be a lot of proof against brute- force attacks, since the search house is much infinite.
Article Details
Unique Paper ID: 153774
Publication Volume & Issue: Volume 8, Issue 8
Page(s): 498 - 502
Article Preview & Download
Share This Article
Conference Alert
NCSST-2023
AICTE Sponsored National Conference on Smart Systems and Technologies
Last Date: 25th November 2023
SWEC- Management
LATEST INNOVATION’S AND FUTURE TRENDS IN MANAGEMENT