SESSION PASSWORD AUTHENTICATION USING IMAGE - BASED SYSTEM [IBS]

Shivamurthaiah Mallaiah, Praveen Kumar K, Sitesh Kumar Sinha, Manasa L.R

Abstract


Abstract: Now, as information systems are more open to the internet, authentication is one the most important security primitive. Authentication plays a significant function in protecting resources against unauthorized use. But currently, many user authentication systems suffer from drawbacks and security threats. Simple text-based passwords are not secure enough and are a burden on the users to remember. The concept that we think is useful to secure or to authenticate the system and help end users, we have to choose a good password. Users often create textual and memorable passwords that are easy about attackers to guess, but strong system-assigned passwords are difficult for users to remember. So, researchers of modern days have gone for alternative methods. For certain applications, research indicates that the utilization of images may be more efficient. This is because humans are far more proficient at recognizing images that they have previously seen than they are at recalling words. To find the best resolutions to this kind of problems we are in search of an alternative, images as passwords here users click on images at any level by the number of times which we have specified, rather than type alphanumeric characters. In this story, this scheme is designed to make surety of our sensitive information, Mobile devices, computer system, and used in many login pages.

Keywords


Authentication, Click, Text, Password, Image.

Full Text:

PDF

References


Takada Tetsuji, Koike Hideki, “Awase-E: Image-based Authentication for Mobile Phones using User’s Favorite Images”. LNCS 2795 Springer

Art Conklin, Glenn Dietrich, Diane Walz, “Password-Based Authentication: A System Perspective”, Proceedings of the 37th Hawaii International Conference on System Sciences – 2004.

-7695-2056-1/04 $17.00 (C) 2004 IEEE

M. Manjunath, Mr. K. Ishthaq Ahamed and Ms. Suchithra.”Security Implementation of 3-Level Security System Using Image Based Authentication” .IJETTCS,vol 2,issue 2,march-april 2013.

Rachna Dhamija and Adrian Perrig, “Deja Vu: A User Study. Using Images for Authentication” In Proceedings of the 9th USENIX Security. Symposium, August 2000

S. Akula and V. Devisetty, "Image Based Registration and Authentication System," in Proceedings ojlv1idwes Instruction and Computing Sym posium, 2004.

XiayuanSuo,YingZhu,G.Scott. Owen,Graphical Password Survey,InProceedingsofAnnualComputer Security Applications Conference, pages 463-472,2005.

“PersuasiveCued ClickPoint: Design, Implementation and Evaluation of a Knowledge-Based Authentication Mechanism”, Sonia Chiasson, Member, IEEE, Elizabeth Stobert, Student Member, IEEE Alain Forget, Robert Biddle, Member, IEEE, and Paul C, van Oorschot, Member, IEEE.

https://hotsoft.carleton.ca/~sonia/content/Chiasson_tdsc_pccp_author_copy.pdf

H.Brown, Considerations in Implementing A Database Management System Encryption Solution, A Research Report presented to The Department of Computer Science at the university of Cape Town, 2003. IJCA

Praveen Kumar K1, Shivamurthaiah M2, Ms.Sheela H.S3, Ms.Manasa L.R4” An Application of Dig-Queper with IBA”, IJIRCCE 2320-9801

http://biometrics.pbworks.com/w/page/14811349/Advantages%20and%20disadvantages%20of%20technologies




DOI: https://doi.org/10.26483/ijarcs.v8i9.4851

Refbacks

  • There are currently no refbacks.




Copyright (c) 2017 International Journal of Advanced Research in Computer Science