A More Secure Position Based Graphical Password Authentication

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5

Abstract

Abstract: We are proposing a new pass-point graphical password authentication by using a simple virtual environment. Our virtual environment is influenced by a social networking site’ s game. In this system, user interacts with the virtual environment and user can generate sequence of interactions according to his /her choice which will gather by a background process. This process decides whether the user is authenticated user or a not, depending on which the system allows or denies accessing the resources. There are many existing authentication schemes are based on a simple pas-point mechanism, most of them are unsuccessful due to the shoulder surfing attacks. The proposed scheme seems sometime similar to the pass-point techniques but it is very much different with respect to the authentication process.

Authors and Affiliations

Mohd. Aqil Khan , YDS Arya , Gaurav Agarwal

Keywords

Related Articles

 Study of Online Banking Security Mechanism in India: Take  ICICI Bank as an Example

 Internet banking has gained wide acceptance internationally and seems to be fast catching up in India with more and more banks entering the fray. online banking is defined as the use of Internet as a remote &nbsp...

 A Survey Of Sign Based Image Copy Detection Methods

 Abstract: The world wide web is filled with billions of images and redundant copies of images can frequently be found on many websites. These duplicates can be exact copies or differ slightly in their visual conten...

 Selecting the correct Data Mining Method: Classification &  InDaMiTe-R

 One of the most difficult tasks in the whole KDD process is to choose the right data mining technique, as the commercial software tools provide more and more possibilities together and the decision  requir...

 Data mining Algorithm’s Variant Analysis

 Abstract: The Data Mining is extricating or mining information from extensive volume of information.Information mining frequently includes the examination of information put away in an information distributioncente...

 Analysis of C4.5 and K-Nearest Neighbor (KNN) Method on Algorithm of Clustering For Deciding Mainstay Area

 Development as a sustainable activity needs a good plan, so the programs can be effective and have a clear objective. Therefore, a model to help the analysis is significantly needed in determining the priority area...

Download PDF file
  • EP ID EP138899
  • DOI -
  • Views 128
  • Downloads 0

How To Cite

Mohd. Aqil Khan, YDS Arya, Gaurav Agarwal (2016). A More Secure Position Based Graphical Password Authentication. IOSR Journals (IOSR Journal of Computer Engineering), 18(5), 58-63. https://europub.co.uk./articles/-A-138899