ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

COMPARATIVE STUDY OF GRAPHICAL USER AUTHENTICATION APPROACHES?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 9)

Publication Date:

Authors : ; ;

Page : 361-375

Keywords : Graphical password; Authentication; Security; Usability; Password space;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Today, authentication technology is the main measure to guarantee information security, and the most common and convenient authentication method in use is the alphanumeric password. However, their inherent defects led to the development of graphical password as an alternative. Graphical password which uses images as passwords, rather than alphanumeric characters is motivated particularly by the fact that it is generally easier for users to remember and recall images than words, and it is conceivable that graphical password would be able to provide better security than alphanumeric password. Authentication, authorization and auditing are the most important issues of security on data communication. In particular, authentication is the life of every individual essential closest friend. The user authentication security is dependent on the strength of user password. A secure password is usually random, strange, very long and difficult to remember. For most users, remember these irregular passwords are very difficult. To easily remember and security are two sides of one coin. Graphical password authentication technology is the use of click on the image to replace input some characters. The graphical user interface can help user easy to create and remember their secure passwords. However, in the graphical password system based on images can provide an alternative password, but too many images will be a large database to store issue. In this thesis, a study of various schemes of graphical user authentication is made and also several challenges in graphical authentication are discussed.

Last modified: 2014-09-21 18:39:04