International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 128

Research Paper | Information Technology | India | Volume 8 Issue 3, March 2019


Session Authentication Using Color Schemes and Images

Manjula Devi B [2] | Rinny Mamachan


Abstract: Authentication is the first step in information security. It requires the user to set a password and remember it at the log in time. Textual passwords are the most traditional schemes that are used for providing security, but textual passwords are vulnerable to dictionary attacks, shoulder surfing, and spy ware. Graphical password schemes overcome the shortcomings of textual passwords, but they are vulnerable to shoulder surfing attacks. To address this problem, text can be used in combination with the colors and images to generate session passwords, thereby making a stronger authentication scheme. In this project the authentication scheme uses colors and text for generating session passwords.


Keywords: Authentication, Session Passwords, Random Art Images


Edition: Volume 8 Issue 3, March 2019,


Pages: 1796 - 1799


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Manjula Devi B, Rinny Mamachan, "Session Authentication Using Color Schemes and Images", International Journal of Science and Research (IJSR), Volume 8 Issue 3, March 2019, pp. 1796-1799, https://www.ijsr.net/get_abstract.php?paper_id=ART20196423

Similar Articles with Keyword 'Authentication'

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Information Technology, India, Volume 12 Issue 12, December 2023

Pages: 2114 - 2119

Zero Knowledge Proof Techniques in PAM Authentication

Sri Kanth Mandru

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 9 Issue 4, April 2020

Pages: 1850 - 1857

Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms

Jeevan Manda [4]

Share this Article
Top