SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.i jret.org 502 
MULTIPLE GRID BASED GRAPHICAL TEXT PASSWORD AUTHENTICATION Vinothini T1, Rajesh I2, Kirupa Rani D3 1PG Scholar, Dept of CSE, Knowledge Institute of Technology, Salem, Tamil Nadu, India 2Associate Professor, Dept of CSE, Knowledge Institute of Technology, Salem, Tamil Nadu, India 3PG Scholar, Dept of CSE, Knowledge Institute of Technology, Salem, Tamil Nadu, India Abstract The system and network security is strengthened by passwords, which is a significant part of an Authentication process. Most commonly an Authentication method using either alpha-numeric password or Graphical password, which has crucial drawbacks like dictionary attacks and shoulder-surfing. The Grid based Graphical Text password Authentication have been emerged as an alternative solutions to overcome the potential vulnerabilities due to conventional schemes. Additionally, originating the “Grid Systemization and Text Enlargement Technique” for classifying a preferred theme Image. By clicking the grid on that theme Image it enlarges a next sequence of password. This method depends on “Image-Image-Alphanumeric password” and the successive mien relies on prior option. This scheme has been acquiring prominence, because of its integrity and security as well as the Grid Systemization and Text Enlargement Technique. Keywords: Grid Systemization & Text Enlargement Technique, Image-Image-Alphanumeric. 
---------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION Since most of the system uses alphanumeric passwords for Authentication process. However, it is well familiar that the Text passwords are insecure for kind of reason. For example, dictionary attack due to choosing simple passwords in favor of prominence, easy to guess, phishing. Similarly, Graphical passwords also has few drawbacks like 1) Authentication can be guessed and succeed when the system holds too few Images. 2) shoulder surfing[1][4]. In this project work, Image-Image-alphanumeric method has been introduced to reduces all those existing drawbacks. Because, proposed scheme depends not only alpha numeric but also Graphical passwords. When user uses Graphical-Text Authentication method, users tend to choose Image password for two steps and they must also enter a Text password as final confirmation. 
The main contribution of this method is to increase security and reduce the size of an Image dataset to store Images. Grid based Graphical - Text password is more efficient than other existing systems because, it ensures 2-way security (Image- Text), Images used for Authentication are classified into many grids and also it will not be suffered by dictionary attacks. The rest of this work is formulated as follows. Section II Summarizes the most recent research addressing the Graphical password system. Our proposed system and the functioning principle of grid classification techniques are presented in section III. Further enhancement and conclusion will be discussed in section IV. 
2. RELATED WORK 
Nowadays, Text passwords are commonly used for most of the Authentication process. In this, user has to enter their name and password. Similarly, while using Graphical passwords user has to select their name and enter an Images instead of entering Text. Graphical password schemes can be motivated by the fact that, humans can easily remember pictures than alpha-numeric; psychological studies are also proved the reality. The steps involved in Graphical password Authentication, Step 1: On logging, user has to enter his/her name that is used when our enrollment. Step 2: The user has to click on the particular Image, which they are preferred as a password during enrollment. Step 3: The consequence of the click has to be the same as the user click during enrollment. Step 4: The succession of click is acclaimed and checked with the existing dataset. Step 5: The user is authenticated, if they enter correct Password. Step 6: If not authenticated, the user has to inquire their Authentication process recurrently. The Graphical password scheme has been divide into three categories. 1) Recall based scheme 2) Recognition based scheme 3) CCP (Cued-recall) method.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http:// www.ijret.org 503 
2.1 Recall Method 
In Recall base technique, user know something. The System 
and the user share a confidential. User must recall and enter 
their password correctly to authenticate themselves into 
system or an application. Several methods are developed by 
using this technique. 
Fig -1: DAS Fig -2: Blonder algorithm 
Fig -3: Pass-Go Fig -4: Pass Doodle 
2.1.1 Draw-A-Secret (DAS): 
By using the mouse, users draw their password on a 2D grid. 
The password is composed of the grid cells that the user 
passes through while drawing. A drawing can contain either 
one continuous stroke or several strokes. 
2.1.2 Blonder Algorithm: 
In this algorithm, user should click several locations on that 
particular Image to select their password. During 
Authentication, the user must click those particular locations 
of an Image ,that is selected when their sign-up process 
2.1.3 Pass-Go: 
User draw their password on a grid, except that the 
intersections are used instead of grid squares. Visually, the 
user’s movements are snapped to grid-lines and intersections 
so that the drawing is not impacted by small variations in the 
trace. 
2.1.4 Pass Doodle: 
Without using a visible grid, user has to create a freehand 
drawing as a watchword. The purpose of additional 
characteristics such as pen color, number of pen strokes, and 
drawing speed are suggested by the originator to add volatility 
to the scribble. 
2.2 Recognition Method 
Recognition methods are something, in which user recognize. 
Similarly, the user and the system share a secret. Cues are 
provided by the system and the user must recognize the secret. 
Anyone capable to perceive the secret will be able to 
authenticate as the primordial user. Graphical passwords 
where users must perceive pre-selected Images from a set of 
decoys decline d into this kind of group. Several methods 
emerged as follows, 
2.2.1 Dhamija and Perrig Algorithm: 
user will be asked to select certain number of Images from a 
set of random pictures generated by a program. Further, user 
will be required to diagnose the pre-selected Images to be 
authenticated. 
2.2.2 Sobrado and Birget Algorithm: 
This technique that overcome the shoulder surfing attacks. In 
their first method which they named ”triangle scheme”, a user 
needs to prefer their pass-object among many displayed 
object. To be authenticated, a user recommended to recognize 
all the pre-selected pass-object which was selected during the 
enrollment phase. The user requires to click inside the convex-hull 
which formed by the pass-object. 
2.2.3 Man Algorithm: 
A user selects a number of pictures as pass-images. Each pass 
image has several variants and each variant is assigned a 
unique code. During Authentication, the user is provoked with 
several scenes. Each scheme holds several pass-objects and 
many decoy-objects. 
2.2.4 Jansen Algorithm: 
For the password creation, a user has to select the theme first 
which consists of thumbnail Images. Eventually, a user has to 
selects and registers a sequence of the selected thumbnail 
photo to form password. 
2.2.5 Passface Algorithm: 
Based on the assumption that human can recall human faces 
easier than other pictures. User are requires to select the 
previously seen human face picture from a grid of nine faces 
which one of the face is the known face and the rest is the 
decoy faces.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http:// www.ijret.org 504 
Fig -5: Dhamija and Fig -6: Sobrado and 
Perrig Algorithm Birget Algorithm 
Fig -7: Man Algorithm Fig-8: Jansen Algorithm 
Fig -9: Passface Algorithm 
2.3 Cued Recall 
Cued-recall is combination of recall and recognition scheme. 
Thus it is more secured than other methods. In cued-recall 
systems, the system provides a cue to help trigger the user's 
memory of the password. Several method developed are, 
Fig -10: Cued Click Points (CCP) 
Fig -11: Implicit Password Authentication (IPA) 
2.3.1 Cued Click Points (CCP): 
A password comprise of one click-point per Image for a 
sequences of Images [4]. The succeeding Image advertised is 
based on the previous click-point so users can obtain 
immediate implicit criticism as to whether they are on the 
correct path when logging in. 
2.3.2 Click Button According to Figures in Grid 
(CBAFG): 
In this multiple background Images is adopted. On registration 
user is presented with four background Image. User should 
choose one or more Image from four background Image. User 
should choose one or more Image from four background 
Image. 
The “n” pass-Image is displayed in turn for the user to select 
several cells as password by clicking the Image. After 
selection user choose an icon from ten icon display as starting 
icon. During Authentication there will be 4 background 
Images. If the icon is not user starting icon then user has to 
click any numeric button randomly and icon will change on 
each click. When starting icon appears user can enter 
password by clicking each cell.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http:// www.ijret.org 505 
2.3.3 Implicit Password Authentication (IPA): 
This is applied in mobile banking. The bank dataset will have 
100 to 200 standard questions. On registrations the user has to 
pick 10-20 questions from dataset and provide answer to the 
selected question. For each question server create an 
intelligent Authentication space using Image. 
The answer to the question will be embedded into Image. On 
Authentication, the server picks one or more questions 
selected by user on registration time randomly .the user need 
to navigate the Image and click the right answer[8]. 
Fig -12: Single zoom mouse click graphical password 
2.3.4 Single Zoom Mouse Click Graphical Password: 
It has some features of cued recall scheme, Dhamija and 
Perrig scheme (recall method) and alphabetic dictionary 
scheme. Alphabetic dictionary add security to Authentication. 
In this the user has to assign an alphabet to each Image in 
theme Image (enlarged Image). For that selected alphabet the 
use has to maintain a set of word starting with the alphabet [1]. 
3. OUR SCHEME 
In cued recall method there are sequence of Image 
enlargement and by clicking on that Image it contains “n” 
number of Images for each user [5]. Our proposed scheme has 
special feature that it uses multiple grid classification 
technique to classify a single theme Image and it uses 2 way 
security (Image-Alphanumeric) for its Authentication. 
In our proposed system, Graphical-Text Authentication is 
done in the basis of Image-Image-alphanumeric. There are 3 
steps to be considered for their Authentication. 
1) The user has to select one Image as a theme Image. The 
theme Image will be classified into many number of grids 
using “Grid Systemization Technique”. By Clicking, any grid 
on that pre-selected theme Image, it enlarges another theme 
Image depend upon our pre-selection. 
2) For every grid on that first theme Image, we are setting 
individual theme Image for its enlargement. An Image that is 
enlarged at second, also classified into multiple grids. 
3) By clicking the grid of second theme Image, it enlarges an 
Input Text box containing “Enter Password”. This box shows 
that we should enter our Text password that is used when our 
registration. 
Selection of one root path from multiple paths make this 
method as an efficient. Finally, the user can be authenticated 
When they will select Graphical as well as Text passwords 
correctly. Let us evaluate the Graphical- Text Authentication 
in the basis of three steps(Image-Image- Alphanumeric). 
A Figure III represents that, a single theme Image can be used 
for an entire system of process and it uses Grid Systemization 
and Text Enlargement Technique. The system can be 
implemented using the following five stages. 1. User 
registration process 2. Picture selection process 3. Grid 
systemization of picture 4.Login process 5. Final 
Authentication 
3.1. User Registration Process 
During registration process user has to provide their username 
and they should specify their passwords for entering into the 
system. Password is the sequence of 3 steps. Our system uses 
Image-Image-Alphanumeric category as password. During 
login process user should enter the specific sequence of 
password to enter into the system. It includes, 
 Entering username 
 Setting password sequence 
3.2. Picture Selection Process 
During picture selection process, picture for password is 
selected for next sequence of modules. There are two types of 
picture selection. 
3.2.1 User Defined Picture 
Fig -13: User Defined Picture
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http:// www.ijret.org 506 
3.2.2 System Defined Picture 
Fig -14: System Defined Picture 
Fig -15: Multiple Grid Based Graphical Text Password 
Authentication 
3.3. Grid Systemization of Picture 
Picture can be classified into multiple grids using grid 
systemization technique. It includes, 
 Setting clickpoint’s of grid as password 
 Picture enlargement 
 Text enlargement 
3.4. Login Process 
Login process includes 3 steps authentication (Image-Image- 
Text). User should visit their sequence of steps for logging 
into the system. It includes, 
 Username selection 
 Grid selection from pictures 
 Text selection 
3.5. Authentication Process 
Final authentication process includes verification of 3 steps 
passwords. If the user enters their 3 steps of passwords in a 
correct manner then they are allowed or authenticated into a 
system. 
4. RESULTS AND DISCUSSION 
In this project work, both graphical and text passwords has 
been used to provide better security and also graphical 
passwords are used in terms of multiple grids instead of using 
simple images. Using Grid Systemization & Text Enlargement 
Technique, images are classified into 5x5 grids. User has to 
select one grid among 25 grids. It improves the performance 
by providing 3 levels of authentication. The three levels are 
Image-Image Alphanumeric. If the user selects the wrong 
sequence in any of the three levels of authentication, the 
system will not enter into the application. So, this project work 
improves the performance and increases the security compared 
to existing methods. Using Visual C# .Net, this project is 
implemented and executed. The results of this work improves 
the performance and security. 
Fig -16: Selecting grids from level 1 
Fig -17: Selecting grids from level 2 and entering Text 
Password
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http:// www.ijret.org 507 
Fig -18: User Authentication Successful 
Fig -19: Invalid user because of wrong selection of password 
sequences 
5. FUTURE ENHANCEMENT AND CONCLUSION 
Graphical password is an emerging technology in this world 
for Authentication.. In this project work, we introduce a novel 
Graphical-Text password Authentication by integrating the 
existing Graphical and Alpha-Numeric Authentication 
systems. 
Both Graphical & Alpha-Numeric password Authentication 
system performs better security but not well enough for large 
and complex systems. However, Graphical/Text 
Authentication has many drawbacks like dictionary attacks, 
shoulder surfing & phishing. Therefore, we try to integrate the 
features present in the Graphical as well as Text password 
Authentication. This can be achieved with the help of Grid 
classification technique and it also adapted to these extended 
applications 
REFERENCES 
[1]. Merin Sebastiian, Biju Abraham Narayamparambil, “A 
New Approach For Instigating Security Using single Zoom 
Mouse Click Graphical Password” International Journal of 
Communication Network Security ISSN:2231-1882, Volume- 
1,Issue-4,2012. 
[2]. P.Golle and D.Wagner, “Cryptanalysis of a Cognitive 
Authentication Schemes”, IEEE Symposium on Security 
Conference. 
[3]. S.Wiedenbeck, J.Waters, J.C.Birget, A.Brodskiy and 
N.Menon, “Authentication using Graphical passwords: Basic 
results”, Human-Computer Interaction International(HCII 
2005),Las Vegas,NV,2005. 
[4]. Sonia Chiasson, P.C.Van Oorschot and Robert Biddle, 
”Graphical password Authentication using cued click 
points”,12th European Symposium On Research In Computer 
Security(ESORICS),2007. 
[5]. Jinhua Qiu, Xiyang Liu, Licheng Ma, Haichang Gao and 
Zhongjie Ren,”A Novel Cued-recall Graphical password 
Scheme”, International Conference on Image and Graphics 
page949-956, Washington,2011 
[6]. G.S.Owen, X.Suo and Y.Zhu,”Grphical passwords: A 
Survey”, in Computer Security Applications Conference,21st 
annual,5-9Dec,2005. 
[7]. Haichang Gao,Xiyang Liu,Sidong Wang,Honggang Liu 
and Ruyi Dai,”Design and Analysis of a Graphical password 
scheme”, International conference on Innovative Computing 
Information and Control ICICIC,2009. 
[8]. Sadiq Almuairti and Parakash Veeraraghavan, 
“IPAS:Implicit Password Authentication Systems”, in 
workshop of International Conference on Advanced 
Information Networking and Applications, Singapore.2011.

Mais conteúdo relacionado

Mais procurados

An Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for AuthenticationAn Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for AuthenticationIJNSA Journal
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...IOSR Journals
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique cscpconf
 
Graphical Password Authentication Using Modified Persuasive Cued Click-Point
Graphical Password Authentication Using Modified Persuasive Cued Click-PointGraphical Password Authentication Using Modified Persuasive Cued Click-Point
Graphical Password Authentication Using Modified Persuasive Cued Click-Pointpaperpublications3
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityijsptm
 
An Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication SystemAn Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication SystemIJERA Editor
 
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...Journal For Research
 
Presentation on Graphical password-technology to make system more secured
Presentation on Graphical password-technology to make system more securedPresentation on Graphical password-technology to make system more secured
Presentation on Graphical password-technology to make system more securedSanjeev Kumar Jaiswal
 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Schemepaperpublications3
 
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...ijiert bestjournal
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET Journal
 

Mais procurados (19)

H364752
H364752H364752
H364752
 
An Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for AuthenticationAn Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for Authentication
 
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
 
An03402300234
An03402300234An03402300234
An03402300234
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique
 
Graphical Password Authentication Using Modified Persuasive Cued Click-Point
Graphical Password Authentication Using Modified Persuasive Cued Click-PointGraphical Password Authentication Using Modified Persuasive Cued Click-Point
Graphical Password Authentication Using Modified Persuasive Cued Click-Point
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and security
 
An Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication SystemAn Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication System
 
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...
 
C045016020
C045016020C045016020
C045016020
 
7. 9589 1-pb
7. 9589 1-pb7. 9589 1-pb
7. 9589 1-pb
 
Presentation on Graphical password-technology to make system more secured
Presentation on Graphical password-technology to make system more securedPresentation on Graphical password-technology to make system more secured
Presentation on Graphical password-technology to make system more secured
 
CARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PASCARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PAS
 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Scheme
 
F0423134
F0423134F0423134
F0423134
 
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based Authentication
 
3 d password
3 d password3 d password
3 d password
 

Destaque

aOS Brussels - Azure Active Directory News
aOS Brussels - Azure Active Directory NewsaOS Brussels - Azure Active Directory News
aOS Brussels - Azure Active Directory NewsMaxime Rastello
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Raghu Vamsy Sirasala
 
Keynote Session : Kill The Password
Keynote Session : Kill The PasswordKeynote Session : Kill The Password
Keynote Session : Kill The PasswordPriyanka Aash
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Open domain question answering system using semantic role labeling
Open domain question answering system using semantic role labelingOpen domain question answering system using semantic role labeling
Open domain question answering system using semantic role labelingeSAT Publishing House
 
Performance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkPerformance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkeSAT Publishing House
 
Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...eSAT Publishing House
 
A study on the importance of image processing and its apllications
A study on the importance of image processing and its apllicationsA study on the importance of image processing and its apllications
A study on the importance of image processing and its apllicationseSAT Publishing House
 
Identifying e learner’s opinion using automated sentiment analysis in e-learning
Identifying e learner’s opinion using automated sentiment analysis in e-learningIdentifying e learner’s opinion using automated sentiment analysis in e-learning
Identifying e learner’s opinion using automated sentiment analysis in e-learningeSAT Publishing House
 
An enhanced adaptive scoring job scheduling algorithm with replication strate...
An enhanced adaptive scoring job scheduling algorithm with replication strate...An enhanced adaptive scoring job scheduling algorithm with replication strate...
An enhanced adaptive scoring job scheduling algorithm with replication strate...eSAT Publishing House
 
Achieving operational excellence by implementing an erp (enterprise resource ...
Achieving operational excellence by implementing an erp (enterprise resource ...Achieving operational excellence by implementing an erp (enterprise resource ...
Achieving operational excellence by implementing an erp (enterprise resource ...eSAT Publishing House
 
Synthesis, characterisation and antibacterial activity of copolymer (n vinylp...
Synthesis, characterisation and antibacterial activity of copolymer (n vinylp...Synthesis, characterisation and antibacterial activity of copolymer (n vinylp...
Synthesis, characterisation and antibacterial activity of copolymer (n vinylp...eSAT Publishing House
 
Novel model for rural housing development
Novel model for rural housing developmentNovel model for rural housing development
Novel model for rural housing developmenteSAT Publishing House
 
The study on effect of torque on piston lateral motion
The study on effect of torque on piston lateral motionThe study on effect of torque on piston lateral motion
The study on effect of torque on piston lateral motioneSAT Publishing House
 
Predicting construction project duration with support
Predicting construction project duration with supportPredicting construction project duration with support
Predicting construction project duration with supporteSAT Publishing House
 
Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...eSAT Publishing House
 
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...eSAT Publishing House
 
Enhancement in power delay product by driver and interconnect optimization
Enhancement in power delay product by driver and interconnect optimizationEnhancement in power delay product by driver and interconnect optimization
Enhancement in power delay product by driver and interconnect optimizationeSAT Publishing House
 

Destaque (20)

aOS Brussels - Azure Active Directory News
aOS Brussels - Azure Active Directory NewsaOS Brussels - Azure Active Directory News
aOS Brussels - Azure Active Directory News
 
11aman
11aman11aman
11aman
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
 
Keynote Session : Kill The Password
Keynote Session : Kill The PasswordKeynote Session : Kill The Password
Keynote Session : Kill The Password
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Open domain question answering system using semantic role labeling
Open domain question answering system using semantic role labelingOpen domain question answering system using semantic role labeling
Open domain question answering system using semantic role labeling
 
Performance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkPerformance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms network
 
Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...
 
A study on the importance of image processing and its apllications
A study on the importance of image processing and its apllicationsA study on the importance of image processing and its apllications
A study on the importance of image processing and its apllications
 
Identifying e learner’s opinion using automated sentiment analysis in e-learning
Identifying e learner’s opinion using automated sentiment analysis in e-learningIdentifying e learner’s opinion using automated sentiment analysis in e-learning
Identifying e learner’s opinion using automated sentiment analysis in e-learning
 
An enhanced adaptive scoring job scheduling algorithm with replication strate...
An enhanced adaptive scoring job scheduling algorithm with replication strate...An enhanced adaptive scoring job scheduling algorithm with replication strate...
An enhanced adaptive scoring job scheduling algorithm with replication strate...
 
Achieving operational excellence by implementing an erp (enterprise resource ...
Achieving operational excellence by implementing an erp (enterprise resource ...Achieving operational excellence by implementing an erp (enterprise resource ...
Achieving operational excellence by implementing an erp (enterprise resource ...
 
Synthesis, characterisation and antibacterial activity of copolymer (n vinylp...
Synthesis, characterisation and antibacterial activity of copolymer (n vinylp...Synthesis, characterisation and antibacterial activity of copolymer (n vinylp...
Synthesis, characterisation and antibacterial activity of copolymer (n vinylp...
 
Novel model for rural housing development
Novel model for rural housing developmentNovel model for rural housing development
Novel model for rural housing development
 
The study on effect of torque on piston lateral motion
The study on effect of torque on piston lateral motionThe study on effect of torque on piston lateral motion
The study on effect of torque on piston lateral motion
 
Predicting construction project duration with support
Predicting construction project duration with supportPredicting construction project duration with support
Predicting construction project duration with support
 
Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...
 
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
 
Enhancement in power delay product by driver and interconnect optimization
Enhancement in power delay product by driver and interconnect optimizationEnhancement in power delay product by driver and interconnect optimization
Enhancement in power delay product by driver and interconnect optimization
 

Semelhante a Multiple grid based graphical text password authentication

Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image SegmentationIRJET Journal
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureeSAT Journals
 
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesIJNSA Journal
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsIJMER
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET Journal
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationIRJET Journal
 
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image PasswordResearch Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Passwordijtsrd
 
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System             IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System IRJET Journal
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationIRJET Journal
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmMangaiK4
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmMangaiK4
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET Journal
 
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITYMULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITYijiert bestjournal
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password schemeIAEME Publication
 
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET Journal
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...eSAT Publishing House
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET Journal
 

Semelhante a Multiple grid based graphical text password authentication (20)

Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image Segmentation
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based Authentication
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image PasswordResearch Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Password
 
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System             IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
 
Ai4506179185
Ai4506179185Ai4506179185
Ai4506179185
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA Algorithm
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA Algorithm
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
 
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITYMULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
 
Jc2516111615
Jc2516111615Jc2516111615
Jc2516111615
 
Jc2516111615
Jc2516111615Jc2516111615
Jc2516111615
 

Mais de eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

Mais de eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Último

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Último (20)

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 

Multiple grid based graphical text password authentication

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.i jret.org 502 MULTIPLE GRID BASED GRAPHICAL TEXT PASSWORD AUTHENTICATION Vinothini T1, Rajesh I2, Kirupa Rani D3 1PG Scholar, Dept of CSE, Knowledge Institute of Technology, Salem, Tamil Nadu, India 2Associate Professor, Dept of CSE, Knowledge Institute of Technology, Salem, Tamil Nadu, India 3PG Scholar, Dept of CSE, Knowledge Institute of Technology, Salem, Tamil Nadu, India Abstract The system and network security is strengthened by passwords, which is a significant part of an Authentication process. Most commonly an Authentication method using either alpha-numeric password or Graphical password, which has crucial drawbacks like dictionary attacks and shoulder-surfing. The Grid based Graphical Text password Authentication have been emerged as an alternative solutions to overcome the potential vulnerabilities due to conventional schemes. Additionally, originating the “Grid Systemization and Text Enlargement Technique” for classifying a preferred theme Image. By clicking the grid on that theme Image it enlarges a next sequence of password. This method depends on “Image-Image-Alphanumeric password” and the successive mien relies on prior option. This scheme has been acquiring prominence, because of its integrity and security as well as the Grid Systemization and Text Enlargement Technique. Keywords: Grid Systemization & Text Enlargement Technique, Image-Image-Alphanumeric. ---------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION Since most of the system uses alphanumeric passwords for Authentication process. However, it is well familiar that the Text passwords are insecure for kind of reason. For example, dictionary attack due to choosing simple passwords in favor of prominence, easy to guess, phishing. Similarly, Graphical passwords also has few drawbacks like 1) Authentication can be guessed and succeed when the system holds too few Images. 2) shoulder surfing[1][4]. In this project work, Image-Image-alphanumeric method has been introduced to reduces all those existing drawbacks. Because, proposed scheme depends not only alpha numeric but also Graphical passwords. When user uses Graphical-Text Authentication method, users tend to choose Image password for two steps and they must also enter a Text password as final confirmation. The main contribution of this method is to increase security and reduce the size of an Image dataset to store Images. Grid based Graphical - Text password is more efficient than other existing systems because, it ensures 2-way security (Image- Text), Images used for Authentication are classified into many grids and also it will not be suffered by dictionary attacks. The rest of this work is formulated as follows. Section II Summarizes the most recent research addressing the Graphical password system. Our proposed system and the functioning principle of grid classification techniques are presented in section III. Further enhancement and conclusion will be discussed in section IV. 2. RELATED WORK Nowadays, Text passwords are commonly used for most of the Authentication process. In this, user has to enter their name and password. Similarly, while using Graphical passwords user has to select their name and enter an Images instead of entering Text. Graphical password schemes can be motivated by the fact that, humans can easily remember pictures than alpha-numeric; psychological studies are also proved the reality. The steps involved in Graphical password Authentication, Step 1: On logging, user has to enter his/her name that is used when our enrollment. Step 2: The user has to click on the particular Image, which they are preferred as a password during enrollment. Step 3: The consequence of the click has to be the same as the user click during enrollment. Step 4: The succession of click is acclaimed and checked with the existing dataset. Step 5: The user is authenticated, if they enter correct Password. Step 6: If not authenticated, the user has to inquire their Authentication process recurrently. The Graphical password scheme has been divide into three categories. 1) Recall based scheme 2) Recognition based scheme 3) CCP (Cued-recall) method.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http:// www.ijret.org 503 2.1 Recall Method In Recall base technique, user know something. The System and the user share a confidential. User must recall and enter their password correctly to authenticate themselves into system or an application. Several methods are developed by using this technique. Fig -1: DAS Fig -2: Blonder algorithm Fig -3: Pass-Go Fig -4: Pass Doodle 2.1.1 Draw-A-Secret (DAS): By using the mouse, users draw their password on a 2D grid. The password is composed of the grid cells that the user passes through while drawing. A drawing can contain either one continuous stroke or several strokes. 2.1.2 Blonder Algorithm: In this algorithm, user should click several locations on that particular Image to select their password. During Authentication, the user must click those particular locations of an Image ,that is selected when their sign-up process 2.1.3 Pass-Go: User draw their password on a grid, except that the intersections are used instead of grid squares. Visually, the user’s movements are snapped to grid-lines and intersections so that the drawing is not impacted by small variations in the trace. 2.1.4 Pass Doodle: Without using a visible grid, user has to create a freehand drawing as a watchword. The purpose of additional characteristics such as pen color, number of pen strokes, and drawing speed are suggested by the originator to add volatility to the scribble. 2.2 Recognition Method Recognition methods are something, in which user recognize. Similarly, the user and the system share a secret. Cues are provided by the system and the user must recognize the secret. Anyone capable to perceive the secret will be able to authenticate as the primordial user. Graphical passwords where users must perceive pre-selected Images from a set of decoys decline d into this kind of group. Several methods emerged as follows, 2.2.1 Dhamija and Perrig Algorithm: user will be asked to select certain number of Images from a set of random pictures generated by a program. Further, user will be required to diagnose the pre-selected Images to be authenticated. 2.2.2 Sobrado and Birget Algorithm: This technique that overcome the shoulder surfing attacks. In their first method which they named ”triangle scheme”, a user needs to prefer their pass-object among many displayed object. To be authenticated, a user recommended to recognize all the pre-selected pass-object which was selected during the enrollment phase. The user requires to click inside the convex-hull which formed by the pass-object. 2.2.3 Man Algorithm: A user selects a number of pictures as pass-images. Each pass image has several variants and each variant is assigned a unique code. During Authentication, the user is provoked with several scenes. Each scheme holds several pass-objects and many decoy-objects. 2.2.4 Jansen Algorithm: For the password creation, a user has to select the theme first which consists of thumbnail Images. Eventually, a user has to selects and registers a sequence of the selected thumbnail photo to form password. 2.2.5 Passface Algorithm: Based on the assumption that human can recall human faces easier than other pictures. User are requires to select the previously seen human face picture from a grid of nine faces which one of the face is the known face and the rest is the decoy faces.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http:// www.ijret.org 504 Fig -5: Dhamija and Fig -6: Sobrado and Perrig Algorithm Birget Algorithm Fig -7: Man Algorithm Fig-8: Jansen Algorithm Fig -9: Passface Algorithm 2.3 Cued Recall Cued-recall is combination of recall and recognition scheme. Thus it is more secured than other methods. In cued-recall systems, the system provides a cue to help trigger the user's memory of the password. Several method developed are, Fig -10: Cued Click Points (CCP) Fig -11: Implicit Password Authentication (IPA) 2.3.1 Cued Click Points (CCP): A password comprise of one click-point per Image for a sequences of Images [4]. The succeeding Image advertised is based on the previous click-point so users can obtain immediate implicit criticism as to whether they are on the correct path when logging in. 2.3.2 Click Button According to Figures in Grid (CBAFG): In this multiple background Images is adopted. On registration user is presented with four background Image. User should choose one or more Image from four background Image. User should choose one or more Image from four background Image. The “n” pass-Image is displayed in turn for the user to select several cells as password by clicking the Image. After selection user choose an icon from ten icon display as starting icon. During Authentication there will be 4 background Images. If the icon is not user starting icon then user has to click any numeric button randomly and icon will change on each click. When starting icon appears user can enter password by clicking each cell.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http:// www.ijret.org 505 2.3.3 Implicit Password Authentication (IPA): This is applied in mobile banking. The bank dataset will have 100 to 200 standard questions. On registrations the user has to pick 10-20 questions from dataset and provide answer to the selected question. For each question server create an intelligent Authentication space using Image. The answer to the question will be embedded into Image. On Authentication, the server picks one or more questions selected by user on registration time randomly .the user need to navigate the Image and click the right answer[8]. Fig -12: Single zoom mouse click graphical password 2.3.4 Single Zoom Mouse Click Graphical Password: It has some features of cued recall scheme, Dhamija and Perrig scheme (recall method) and alphabetic dictionary scheme. Alphabetic dictionary add security to Authentication. In this the user has to assign an alphabet to each Image in theme Image (enlarged Image). For that selected alphabet the use has to maintain a set of word starting with the alphabet [1]. 3. OUR SCHEME In cued recall method there are sequence of Image enlargement and by clicking on that Image it contains “n” number of Images for each user [5]. Our proposed scheme has special feature that it uses multiple grid classification technique to classify a single theme Image and it uses 2 way security (Image-Alphanumeric) for its Authentication. In our proposed system, Graphical-Text Authentication is done in the basis of Image-Image-alphanumeric. There are 3 steps to be considered for their Authentication. 1) The user has to select one Image as a theme Image. The theme Image will be classified into many number of grids using “Grid Systemization Technique”. By Clicking, any grid on that pre-selected theme Image, it enlarges another theme Image depend upon our pre-selection. 2) For every grid on that first theme Image, we are setting individual theme Image for its enlargement. An Image that is enlarged at second, also classified into multiple grids. 3) By clicking the grid of second theme Image, it enlarges an Input Text box containing “Enter Password”. This box shows that we should enter our Text password that is used when our registration. Selection of one root path from multiple paths make this method as an efficient. Finally, the user can be authenticated When they will select Graphical as well as Text passwords correctly. Let us evaluate the Graphical- Text Authentication in the basis of three steps(Image-Image- Alphanumeric). A Figure III represents that, a single theme Image can be used for an entire system of process and it uses Grid Systemization and Text Enlargement Technique. The system can be implemented using the following five stages. 1. User registration process 2. Picture selection process 3. Grid systemization of picture 4.Login process 5. Final Authentication 3.1. User Registration Process During registration process user has to provide their username and they should specify their passwords for entering into the system. Password is the sequence of 3 steps. Our system uses Image-Image-Alphanumeric category as password. During login process user should enter the specific sequence of password to enter into the system. It includes,  Entering username  Setting password sequence 3.2. Picture Selection Process During picture selection process, picture for password is selected for next sequence of modules. There are two types of picture selection. 3.2.1 User Defined Picture Fig -13: User Defined Picture
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http:// www.ijret.org 506 3.2.2 System Defined Picture Fig -14: System Defined Picture Fig -15: Multiple Grid Based Graphical Text Password Authentication 3.3. Grid Systemization of Picture Picture can be classified into multiple grids using grid systemization technique. It includes,  Setting clickpoint’s of grid as password  Picture enlargement  Text enlargement 3.4. Login Process Login process includes 3 steps authentication (Image-Image- Text). User should visit their sequence of steps for logging into the system. It includes,  Username selection  Grid selection from pictures  Text selection 3.5. Authentication Process Final authentication process includes verification of 3 steps passwords. If the user enters their 3 steps of passwords in a correct manner then they are allowed or authenticated into a system. 4. RESULTS AND DISCUSSION In this project work, both graphical and text passwords has been used to provide better security and also graphical passwords are used in terms of multiple grids instead of using simple images. Using Grid Systemization & Text Enlargement Technique, images are classified into 5x5 grids. User has to select one grid among 25 grids. It improves the performance by providing 3 levels of authentication. The three levels are Image-Image Alphanumeric. If the user selects the wrong sequence in any of the three levels of authentication, the system will not enter into the application. So, this project work improves the performance and increases the security compared to existing methods. Using Visual C# .Net, this project is implemented and executed. The results of this work improves the performance and security. Fig -16: Selecting grids from level 1 Fig -17: Selecting grids from level 2 and entering Text Password
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http:// www.ijret.org 507 Fig -18: User Authentication Successful Fig -19: Invalid user because of wrong selection of password sequences 5. FUTURE ENHANCEMENT AND CONCLUSION Graphical password is an emerging technology in this world for Authentication.. In this project work, we introduce a novel Graphical-Text password Authentication by integrating the existing Graphical and Alpha-Numeric Authentication systems. Both Graphical & Alpha-Numeric password Authentication system performs better security but not well enough for large and complex systems. However, Graphical/Text Authentication has many drawbacks like dictionary attacks, shoulder surfing & phishing. Therefore, we try to integrate the features present in the Graphical as well as Text password Authentication. This can be achieved with the help of Grid classification technique and it also adapted to these extended applications REFERENCES [1]. Merin Sebastiian, Biju Abraham Narayamparambil, “A New Approach For Instigating Security Using single Zoom Mouse Click Graphical Password” International Journal of Communication Network Security ISSN:2231-1882, Volume- 1,Issue-4,2012. [2]. P.Golle and D.Wagner, “Cryptanalysis of a Cognitive Authentication Schemes”, IEEE Symposium on Security Conference. [3]. S.Wiedenbeck, J.Waters, J.C.Birget, A.Brodskiy and N.Menon, “Authentication using Graphical passwords: Basic results”, Human-Computer Interaction International(HCII 2005),Las Vegas,NV,2005. [4]. Sonia Chiasson, P.C.Van Oorschot and Robert Biddle, ”Graphical password Authentication using cued click points”,12th European Symposium On Research In Computer Security(ESORICS),2007. [5]. Jinhua Qiu, Xiyang Liu, Licheng Ma, Haichang Gao and Zhongjie Ren,”A Novel Cued-recall Graphical password Scheme”, International Conference on Image and Graphics page949-956, Washington,2011 [6]. G.S.Owen, X.Suo and Y.Zhu,”Grphical passwords: A Survey”, in Computer Security Applications Conference,21st annual,5-9Dec,2005. [7]. Haichang Gao,Xiyang Liu,Sidong Wang,Honggang Liu and Ruyi Dai,”Design and Analysis of a Graphical password scheme”, International conference on Innovative Computing Information and Control ICICIC,2009. [8]. Sadiq Almuairti and Parakash Veeraraghavan, “IPAS:Implicit Password Authentication Systems”, in workshop of International Conference on Advanced Information Networking and Applications, Singapore.2011.