Journal of Theoretical and Applied Information Technology
Computer systems employ user authentication as their primary means to protect system resources from unauthorized users and malicious attacks. Especially when multiple users share a set of systems and resources, effective authentication is very much required. Over the years, several authentication methods have been developed. The most commonly used method is the textual password based authentication. Users are required to choose a text comprising of alphabets, numbers and symbols. Once passwords are registered with the system, users need to recall and submit it each time of their login.