Provided by: International Journal of Computer Science and Mobile Computing (IJCSMC)
Date Added: Nov 2014
In general, the authors use alphanumeric characters, special characters, sound signature and images for passwords during registration process. Where the entered password should be matched with either sound signature or images that were stored in database. Whereas, the images are checked with their exact pixel position (i.e. hotspot). Hotspots are particular areas of image that have higher likelihood of being selected by users as password click-points. But in the existing system, it is easy to hack the system by identifying the single hot spot on the image.