International Journal of Computer Applications
Current authentication schemes suffer from many weaknesses. Textual passwords are widely used; however users tend to choose meaningful words from dictionaries. This makes textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords face lack of space. Smart cards or tokens can be lost or are prone to theft. Many biometric authentications have been proposed but users tend to resist using them because of their intrusiveness on their privacy.