A Novel Approach for Graphical User Authentication

Download Now
Provided by: IJAIR
Topic: Security
Format: PDF
Textual-based password authentication scheme tends to be more vulnerable to attacks such as shoulder surfing and hidden camera, eves dropping, and dictionary attacks, social engineering. To overcome the vulnerabilities of traditional methods, visual or graphical password schemes have been developed as possible alternative solutions to text-based password schemes. Most of the graphical schemes are vulnerable to shoulder surfing. To address this problem, text can be combined with images or colors to generate session passwords for authentication. Session passwords can be used only once and every time a new password is generated.
Download Now

Find By Topic