Graphical password user authentication system
Sakshi Mali, Ashika Kumar, Harshita Kulal, Surendra Sutar
Django, POI, CCP, GPAS, Passpoints, Passfaces
Computer security depends for the most part on passwords to attest human users from attackers. The foremost common computer authentication technique is to use alphanumerical usernames and passwords. However, this technique has been shown to possess important drawbacks, as an example, users tend to select passwords that may be simply guessed. On the opposite hand, if a word is tough to guess, then it's usually exhausting to recollect. To handle this drawback, some researchers have developed authentication ways that use photos as passwords. During this paper, we have a tendency to conduct a comprehensive survey of the prevailing graphical password techniques and supply an attainable theory of our own. Human factors are usually thought-about the weakest link in a very pc security system. If we have a tendency to means that there are 3 major areas wherever human-computer interaction is important: authentication, security operations, and developing secure systems. Here we have a tendency to specialize in the authentication drawback. User authentication may be an elementary part in most pc security contexts. Graphical passwords consult with exploitation pictures (also drawings) as passwords. In theory, graphical passwords are easier to recollect, since humans keep in mind photos higher than words. Also, they ought to be a lot of proof against brute- force attacks, since the search house is much infinite.
Article Details
Unique Paper ID: 153774

Publication Volume & Issue: Volume 8, Issue 8

Page(s): 498 - 502
Article Preview & Download

Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 11 Issue 1

Last Date for paper submitting for Latest Issue is 25 June 2024

About Us enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on

Social Media

Google Verified Reviews