Persuasive Cued Click Based Graphical Password with  Scrambling For Knowledge Based Authentication Technique with  Image Scrambling

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 13, Issue 2

Abstract

 Adequate user authentication is a persistent problem, particularly with hand- held devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization’s  influence. Yet, these devices are being used increasingly in corporate settings where they pose a security risk,  not only by containing sensitive information, but also by providing the means to access such information over  wireless network interfaces. User authentication is the first line of defense for a lost or stolen PDA. How- ever,  motivating users to enable simple PIN or password mechanisms and periodically update their authentication  information is a constant struggle. This paper describes a general-purpose mechanism for authenticating a user  to a PDA using a visual login technique called Picture Password. The underlying rationale is that image recall  is an easy and natural way for users to authenticate, removing a serious barrier to compliance with  organizational policy. Features of Picture Password include style dependent image selection, password reuse,  and embedded salting, which overcome a number of problems with knowledge-based authentication for handheld devices. Though designed specifically for handheld devices, Picture Password is also suitable for  note-books, workstations, and other computational devices. Scrambling technique is applied to make image  recognition more complex during the login process and thus protecting from the common attacks in the  graphical password system

Authors and Affiliations

BINITHA V . M

Keywords

Related Articles

The Importance of Object-Oriented Programming in This Era of Mobile Application Development

Abstract: In the past two decades object oriented programming has become the dominant programming OOP paradigm used by application developers. Object oriented programming scales very well, from the most trivial of proble...

An Efficient Strategy to Reduce and To Restrict Malicious Attacks on the Web with Web Sense

Abstract: As the growth of Information Technology and Communication has led to vivid change, people can connect with each other globally at anywhere and in anytime through search engines. These search engines has also tr...

 Digital Image Forgery Detection by Contrast Enhancement

 Abstract: For decades, photographs have been used to document space-time events and they have often served as evidence in courts. Today, powerful digital image editing software makes image modifications straightfor...

 An Overview of Intrusion Detection and Prevention Systems  (IDPS) and Security Issues

 Technical solutions, introduced by policies and implantations are essential requirements of an information security program. Advanced technologies such as intrusion detection and prevention system (IDPS)  an...

Improved Product Ranking For Recommendation Systems

Abstract: In the new area of information technology, the most important and recognition machine learning technique is Recommender engine. Vast numbers of knowledge discovery techniques are applied by recommender system t...

Download PDF file
  • EP ID EP161884
  • DOI -
  • Views 106
  • Downloads 0

How To Cite

BINITHA V . M (2013).  Persuasive Cued Click Based Graphical Password with  Scrambling For Knowledge Based Authentication Technique with  Image Scrambling. IOSR Journals (IOSR Journal of Computer Engineering), 13(2), 14-24. https://europub.co.uk./articles/-A-161884