Authentication Schemes for Session Passwords using Color and Images full report
#1

Authentication Schemes for Session Passwords using Color and Images



.pdf   Authentication Schemes for Session Passwords using Color and Images.pdf (Size: 634.22 KB / Downloads: 84)

INTRODUCTION

The most common method used for authentication is textual password. The vulnerabilities of
this method like eves dropping, dictionary attack, social engineering and shoulder surfing are
well known. Random and lengthy passwords can make the system secure. But the main
problem is the difficulty of remembering those passwords. Studies have shown that users tend
to pick short passwords or passwords that are easy to remember. Unfortunately, these
passwords can be easily guessed or cracked. The alternative techniques are graphical passwords
and biometrics. But these two techniques have their own disadvantages. Biometrics, such as
finger prints, iris scan or facial recognition have been introduced but not yet widely adopted.
The major drawback of this approach is that such systems can be expensive and the
identification process can be slow. There are many graphical password schemes that are
proposed in the last decade. But most of them suffer from shoulder surfing which is becoming
quite a big problem. There are graphical passwords schemes that have been proposed which are
resistant to shoulder-surfing but they have their own drawbacks like usability issues or taking
more time for user to login or having tolerance levels. Personal Digital Assistants are being
used by the people to store their personal and confidential information like passwords and PIN
numbers. Authentication should be provided for the usage of these devices.


RELATED WORK

Dhamija and Perrig[1] proposed a graphical authentication scheme where the user has
to identify the pre-defined images to prove user’s authenticity. In this system, the user selects a
certain number of images from a set of random pictures during registration. Later, during login
the user has to identify the pre selected images for authentication from a set of images as shown
in figure 1. This system is vulnerable to shoulder-surfing.


NEW AUTHENTICATION SCHEMES
Authentication technique consists of 3 phases: registration phase, login phase and verification
phase. During registration, user enters his password in first method or rates the colors in the
second method. During login phase, the user has to enter the password based on the interface
displayed on the screen. The system verifies the password entered by comparing with content of
the password generated during registration.


Hybrid Textual Authentication Scheme

During registration, user should rate colors as shown in figure 9. The User should rate colors
from 1 to 8 and he can remember it as “RLYOBGIP”. Same rating can be given to different
colors. During the login phase, when the user enters his username an interface is displayed
based on the colors selected by the user. The login interface consists of grid of size 8×8. This
grid contains digits 1-8 placed randomly in grid cells. The interface also contains strips of colors
as shown in figure 10. The color grid consists of 4 pairs of colors. Each pair of color represents
the row and the column of the grid.


SECURITY ANALYSIS
As the interface changes every time, the session password changes. This technique is resistant to
shoulder surfing. Due to dynamic passwords, dictionary attack is not applicable. Hidden camera
attacks are not applicable to PDAs because it is difficult to capture the interface in the PDAs.
Dictionary Attack: These are attacks directed towards textual passwords. Here in this attack,
hacker uses the set of dictionary words and authenticate by trying one word after one. The
Dictionary attacks fails towards our authentication systems because session passwords are used
for every login.
Reply
#2

can we get the source code for Authentication Schemes for Session Passwords using Color and Images by Android
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: dfd for authentication schemes using images and colors, advantages and disadvantages of authentication schemes for session passwords using color and images, introduction to 3d passwords, authentication schemes for session passwords using color and images documentation ppt, graphical passwords authentication, authentication schemes for session passwords using color and images ieee, java coding for authentication scheme for session password using image,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  PC BASED SUBSTATION MONITORING AND CONTROLLING USING RF seminar details 4 7,119 17-09-2016, 12:58 PM
Last Post: Guest
  ATM WITH AN EYE FULL REPORT seminar details 1 5,778 09-07-2016, 12:36 PM
Last Post: seminar report asees
  AUTOMATIC PHASE CHANGER full report seminar paper 3 3,544 27-03-2015, 10:06 AM
Last Post: seminar report asees
  Wireless LAN Security FULL REPORT seminar details 3 5,129 06-11-2014, 09:23 PM
Last Post: seminar report asees
  BRAIN FINGERPRINTING full report project uploader 2 10,782 24-10-2014, 11:49 PM
Last Post: jaseela123d
  TERRORISM full report project uploader 2 2,278 08-05-2013, 10:17 AM
Last Post: computer topic
  MEMRISTOR FULL REPORT seminar details 1 3,446 25-01-2013, 12:02 PM
Last Post: seminar details
  Windows 8 FULL REPORT seminar paper 3 4,478 24-01-2013, 12:34 PM
Last Post: seminar details
  FIREWIRE full report seminar details 1 2,446 11-01-2013, 10:18 AM
Last Post: seminar details
  SOLAR POWER TOWER full report seminar details 1 2,331 30-11-2012, 01:39 PM
Last Post: seminar details

Forum Jump: