Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{153774, author = {Sakshi Mali and Ashika Kumar and Harshita Kulal and Surendra Sutar}, title = {Graphical password user authentication system}, journal = {International Journal of Innovative Research in Technology}, year = {}, volume = {8}, number = {8}, pages = {498-502}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=153774}, abstract = {Computer security depends for the most part on passwords to attest human users from attackers. The foremost common computer authentication technique is to use alphanumerical usernames and passwords. However, this technique has been shown to possess important drawbacks, as an example, users tend to select passwords that may be simply guessed. On the opposite hand, if a word is tough to guess, then it's usually exhausting to recollect. To handle this drawback, some researchers have developed authentication ways that use photos as passwords. During this paper, we have a tendency to conduct a comprehensive survey of the prevailing graphical password techniques and supply an attainable theory of our own. Human factors are usually thought-about the weakest link in a very pc security system. If we have a tendency to means that there are 3 major areas wherever human-computer interaction is important: authentication, security operations, and developing secure systems. Here we have a tendency to specialize in the authentication drawback. User authentication may be an elementary part in most pc security contexts. Graphical passwords consult with exploitation pictures (also drawings) as passwords. In theory, graphical passwords are easier to recollect, since humans keep in mind photos higher than words. Also, they ought to be a lot of proof against brute- force attacks, since the search house is much infinite.}, keywords = {Django, POI, CCP, GPAS, Passpoints, Passfaces}, month = {}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry