This paper is published in Volume-6, Issue-3, 2020
Area
Electronics and Communication Engineering
Author
Ragamai Vallathur, M. Jansi Rani
Org/Univ
Panimalar Institute of Technology (PIT), Chennai, Tamil Nadu, India
Pub. Date
11 June, 2020
Paper ID
V6I3-1501
Publisher
Keywords
Alphanumerical Usernames, Graphical Password Techniques, Authentication Failure

Citationsacebook

IEEE
Ragamai Vallathur, M. Jansi Rani. Integral security option towards unpredictable patterns, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Ragamai Vallathur, M. Jansi Rani (2020). Integral security option towards unpredictable patterns. International Journal of Advance Research, Ideas and Innovations in Technology, 6(3) www.IJARIIT.com.

MLA
Ragamai Vallathur, M. Jansi Rani. "Integral security option towards unpredictable patterns." International Journal of Advance Research, Ideas and Innovations in Technology 6.3 (2020). www.IJARIIT.com.

Abstract

The most predominant computer authentication method is to use alphanumerical usernames and passwords whereas this method has been shown many major disadvantages. This is due to the problem that, users tend to choose passwords that can be easily guessed and hacked by hackers. On the other hand, Considering the user has got a password which is difficult to guess, then it is difficult to remember. To overcome this kind of problem of low security, High-end Authentication methods are developed by researchers that use images as crystal clear password. In our research, we conduct a comprehensive study on the existing graphical password techniques and provide a possible solution using Graphical password schemes which have been proposed as a possible alternative to text-based schemes. This is based on the human intelligence analysis such as, humans can remember pictures better than text; Pictures are generally very easy to be remembered or recognized than text. The high-level concept is, the user is permitted to click the portion of an image, each click results in showing a next-image, in effect leading users down a “path” based on the type and portion of click on their sequence of points. A wrong click by the fake user leads down in an incorrect path, with an explicit indication of authentication failure only after the final click. Fake users more than 2 attempts will be blocked from future access.
Paper PDF