ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Survey on Key logging-resistant Visual Authentication Protocol

Journal: International Journal for Research in Engineering Application & Management (Vol.03, No. 09)

Publication Date:

Authors : ;

Page : 05-08

Keywords : Graphical passwords; Social engineering; Distortion; Key logging; visual authentication protocols;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The Keystroke logging, referred to as key logging or capturing the strokes of keyboard, is the act of recording which means logging the keys pressed on a keyboard, other way round it is, that the person using the keyboard is unknown about the fact that their actions are being observed. Key logging can also be used to study human–computer interaction. We have large number of key logging methods that range from hardware and software approaches to acoustic analysis. Here we have proposed two visual authentication protocols one is a one-time-password protocol, the other one is password-based authentication protocol. We verify that our protocols are much strong and can with stand to many of the challenging authentication attacks. Our main focus is to highlight the potential of our approach for real-world deployment: whether we can achieve a high level of usability with satisfactory and acceptable results

Last modified: 2018-01-11 00:11:03