SESSION PASSWORD AUTHENTICATION USING IMAGE - BASED SYSTEM [IBS]

Main Article Content

Shivamurthaiah Mallaiah
Praveen Kumar K
Sitesh Kumar Sinha
Manasa L.R

Abstract

Abstract: Now, as information systems are more open to the internet, authentication is one the most important security primitive. Authentication plays a significant function in protecting resources against unauthorized use. But currently, many user authentication systems suffer from drawbacks and security threats. Simple text-based passwords are not secure enough and are a burden on the users to remember. The concept that we think is useful to secure or to authenticate the system and help end users, we have to choose a good password. Users often create textual and memorable passwords that are easy about attackers to guess, but strong system-assigned passwords are difficult for users to remember. So, researchers of modern days have gone for alternative methods. For certain applications, research indicates that the utilization of images may be more efficient. This is because humans are far more proficient at recognizing images that they have previously seen than they are at recalling words. To find the best resolutions to this kind of problems we are in search of an alternative, images as passwords here users click on images at any level by the number of times which we have specified, rather than type alphanumeric characters. In this story, this scheme is designed to make surety of our sensitive information, Mobile devices, computer system, and used in many login pages.

Downloads

Download data is not yet available.

Article Details

Section
Articles
Author Biography

Shivamurthaiah Mallaiah, Assistant Professor, School of Computational Sciences and Information Technology, Garden City University, Bengaluru. Research Scholar AISECT University, Bhopal

Assistant Professor Department of Computer Science

References

Takada Tetsuji, Koike Hideki, “Awase-E: Image-based Authentication for Mobile Phones using User’s Favorite Imagesâ€. LNCS 2795 Springer

Art Conklin, Glenn Dietrich, Diane Walz, “Password-Based Authentication: A System Perspectiveâ€, Proceedings of the 37th Hawaii International Conference on System Sciences – 2004.

-7695-2056-1/04 $17.00 (C) 2004 IEEE

M. Manjunath, Mr. K. Ishthaq Ahamed and Ms. Suchithra.â€Security Implementation of 3-Level Security System Using Image Based Authentication†.IJETTCS,vol 2,issue 2,march-april 2013.

Rachna Dhamija and Adrian Perrig, “Deja Vu: A User Study. Using Images for Authentication†In Proceedings of the 9th USENIX Security. Symposium, August 2000

S. Akula and V. Devisetty, "Image Based Registration and Authentication System," in Proceedings ojlv1idwes Instruction and Computing Sym posium, 2004.

XiayuanSuo,YingZhu,G.Scott. Owen,Graphical Password Survey,InProceedingsofAnnualComputer Security Applications Conference, pages 463-472,2005.

“PersuasiveCued ClickPoint: Design, Implementation and Evaluation of a Knowledge-Based Authentication Mechanismâ€, Sonia Chiasson, Member, IEEE, Elizabeth Stobert, Student Member, IEEE Alain Forget, Robert Biddle, Member, IEEE, and Paul C, van Oorschot, Member, IEEE.

https://hotsoft.carleton.ca/~sonia/content/Chiasson_tdsc_pccp_author_copy.pdf

H.Brown, Considerations in Implementing A Database Management System Encryption Solution, A Research Report presented to The Department of Computer Science at the university of Cape Town, 2003. IJCA

Praveen Kumar K1, Shivamurthaiah M2, Ms.Sheela H.S3, Ms.Manasa L.R4†An Application of Dig-Queper with IBAâ€, IJIRCCE 2320-9801

http://biometrics.pbworks.com/w/page/14811349/Advantages%20and%20disadvantages%20of%20technologies