we want code and logic for color scheme session password by using color matrix.
Posts: 14,118
Threads: 61
Joined: Oct 2014
Text passwords are the most common method used for authentication. However, text passwords are vulnerable to dropping eves, dictionary attacks, social engineering, and shoulder surfing. Graphical passwords are introduced as alternative techniques to text passwords. Most graphic schemes are vulnerable to shoulder surfing. To address this problem, text can be combined with images or colours to generate session passwords for authentication. Session passwords can only be used once and each time a new password is generated. In this article, two techniques are proposed to generate session passwords with text and colours resistant to shoulder surfing. These methods are suitable for personal digital assistants.
The most common method used for authentication is the textual password. The vulnerabilities of this method such as dropping eves, dictionary attack, social engineering and surfing shoulder are well known. Random and long passwords can make the system secure. But the main problem is the difficulty of remembering those passwords. Studies have shown that users tend to choose short passwords or passwords that are easy to remember. Unfortunately, these passwords can be easily guessed or cracked. The alternative techniques are graphical passwords and biometrics. But these two techniques have their own disadvantages. Biometrics, such as fingerprints, iris scanning or facial recognition, have been introduced but have not yet been widely adopted. The main drawback of this approach is that such systems can be costly and the identification process can be slow. There are many graphical password schemes that are proposed over the last decade. But most of them suffer from shoulder surfing which is becoming a big problem. There are graphical password schemes that have been proposed that are resistant to shoulder-surfing, but have their own drawbacks such as usability issues or take more time for the user to log on or have tolerance levels. Personal digital assistants are being used by people to store their personal and confidential information such as passwords and PIN numbers. Authentication must be provided for the use of these devices.
It can be understood in the following video: