Loading…

The Shoulder Surfing Resistant Graphical Password Authentication Technique

Nowadays computer as well as information security is the most significant challenge. Authorized users should access the system or information. Authorization can’t occur without authentication. For this authentication various techniques are available. Among them the most popular and easy is the passw...

Full description

Saved in:
Bibliographic Details
Published in:Procedia computer science 2016, Vol.79, p.490-498
Main Authors: Gokhale, Mrs. Aakansha S., Waghmare, Vijaya S.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Nowadays computer as well as information security is the most significant challenge. Authorized users should access the system or information. Authorization can’t occur without authentication. For this authentication various techniques are available. Among them the most popular and easy is the password technique. Password ensures that computer or information can be accessed by those who have been granted right to view or access them. Traditional password technique is a textual password which is also called alphanumeric password. But these textual passwords are easy to crack through various types of attack. So to overcome these vulnerabilities, a graphical password technique is introduced. As name suggests in this technique images (pictures) are used as a password instead of text. Also psychological study says that human can easily remember images than text. So according to this fact, graphical passwords are easy to remember and difficult to guess. But because of graphic nature, nearly all the graphical password techniques are vulnerable to shoulder surfing attack. So here, a new graphical password authentication technique is proposed which is resistant to shoulder surfing and also other types of possible attacks to some extent. It is a combination of recognition and recall based approach. It can be useful for smart held devices like smart phones, PDA, iPod, iPhone etc.
ISSN:1877-0509
1877-0509
DOI:10.1016/j.procs.2016.03.063