A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 111 | Views: 396

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015 | Popularity: 6.3 / 10


     

A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes

Dhanashree Chaudhari


Abstract: Data and PC security is upheld generally by passwords which are the guideline piece of the confirmation process. The most widely recognized PC confirmation technique is to utilize alphanumerical username and secret key which has critical downsides. To beat the vulnerabilities of customary routines, visual or graphical secret word plans have been created as could be expected under the circumstances elective answers for content based plan. A potential downside of graphical secret word plans is that they are more helpless against shoulder surfing than traditional alphanumeric content passwords. At the point when clients include their passwords in an open spot, they may be at danger of aggressors taking their watchword. An aggressor can catch a secret key by direct perception or by recording the singular's verification session. This is alluded to as shoulder surfing and is a known danger, of unique concern when confirming openly puts. In this paper we will show an overview on graphical secret key plans from 2005 till 2009 which are proposed to be safe against shoulder surfing assaults.


Keywords: Graphical Password, Shoulder Surfing, Authentication Scheme, Passwords, Graphical Authentication, Password Attacks


Edition: Volume 4 Issue 11, November 2015


Pages: 2418 - 2422



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Dhanashree Chaudhari, "A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes", International Journal of Science and Research (IJSR), Volume 4 Issue 11, November 2015, pp. 2418-2422, https://www.ijsr.net/getabstract.php?paperid=NOV151759, DOI: https://www.doi.org/10.21275/NOV151759

Similar Articles

Downloads: 89

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2067 - 2068

An Analysis of Mobile Applications Security; Issue and Aspects from the Users Perspective

Ashish A Kulkarni, Dr. Shivaji R. Madan

Share this Article

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Share this Article

Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2137 - 2139

A Review of the Graphical Password Based Authentication Schemes

Shraddha S. Banne, Prof. Kishor N. Shedge

Share this Article

Downloads: 106 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

Downloads: 107

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1954 - 1955

Internal Intrusion Detection Systems

Bhingardive Deepali R, Ranmalkar Vrushali S

Share this Article
Top