Javascript must be enabled to continue!
An Enhanced Graphical Password Technique Using Fake Pointers
View through CrossRef
Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset, such as person, community, nation, or organization. Thus, the determination of a user being allowed access to a resource(s) is done cautiously. Alphanumeric password has been used for authentication, however, it is inherently limited. Graphical password is a possible alternative. Consequently, this paper designs a new graphical password technique based on images, rather than alphanumeric strings. Although, graphical password technique is more secure than textual password. It is also vulnerable to attacks. The most common problem therefore with Graphical Password is the Shoulder Surfing problem, also called “PEEPING ATTACK”. In this paper, we proposed a user authentication technique called “FAKEPOINTER”- a user authentication technique that conceals users’ authentication secret regardless of a shoulder surfer success by video camera(s). In the software designed, a graphical password fake indicator (pointer) is incorporated to enhance users’ login (password) against attack. The system is designed to run on windows platform with .Net support with Microsoft Structured Query Language Server as the back end, C# as front end. The system performs better when compared to existing system.
Title: An Enhanced Graphical Password Technique Using Fake Pointers
Description:
Security is the degree of resistance to, or protection from harm.
It applies to any vulnerable and valuable asset, such as person, community, nation, or organization.
Thus, the determination of a user being allowed access to a resource(s) is done cautiously.
Alphanumeric password has been used for authentication, however, it is inherently limited.
Graphical password is a possible alternative.
Consequently, this paper designs a new graphical password technique based on images, rather than alphanumeric strings.
Although, graphical password technique is more secure than textual password.
It is also vulnerable to attacks.
The most common problem therefore with Graphical Password is the Shoulder Surfing problem, also called “PEEPING ATTACK”.
In this paper, we proposed a user authentication technique called “FAKEPOINTER”- a user authentication technique that conceals users’ authentication secret regardless of a shoulder surfer success by video camera(s).
In the software designed, a graphical password fake indicator (pointer) is incorporated to enhance users’ login (password) against attack.
The system is designed to run on windows platform with .
Net support with Microsoft Structured Query Language Server as the back end, C# as front end.
The system performs better when compared to existing system.
Related Results
Analisis Saddu Dzari’ah terhadap Penggunaan Aplikasi Fake Global Positioning System (GPS) pada Shopeefood Driver
Analisis Saddu Dzari’ah terhadap Penggunaan Aplikasi Fake Global Positioning System (GPS) pada Shopeefood Driver
Abstract. Shopee is a company engaged in online-based buying and selling services. One of the latest features of Shopee is the ShopeeFood service and has standard rules that must b...
Efficient Plain Password Cryptanalysis Techniques
Efficient Plain Password Cryptanalysis Techniques
In this research work, some low complexity and efficient cryptanalysis approaches are proposed to decrypt password (encryption keys). Passwords are still one of the most common mea...
Aplikasi Pengukuran Kekuatan dan Rekomendasi Password Berdasarkan Input Pengguna dengan Metode Entropi
Aplikasi Pengukuran Kekuatan dan Rekomendasi Password Berdasarkan Input Pengguna dengan Metode Entropi
Penelitian ini mengembangkan aplikasi berbasis Python untuk mengevaluasi kekuatan password serta memberikan rekomendasi password yang lebih aman menggunakan alfabet fonetik NATO, T...
Organizational Password Policy
Organizational Password Policy
The purpose of this chapter is to provide an overview of password policy. It specifically identifies some basic elements of password policy, password and password policy life cycle...
Organizational Password Policy
Organizational Password Policy
The purpose of this chapter is to provide an overview of password policy. It specifically identifies some basic elements of password policy, password and password policy life cycle...
Pixel Value Graphical Password Scheme: Identifying Design Features and Requirements
Pixel Value Graphical Password Scheme: Identifying Design Features and Requirements
Pixel value graphical password scheme was introduced with the aim to solve problems faced by users during authentication process that arising from current graphical password scheme...
Password Based Distribution Panel and Circuit Breaker Operation for the Safety of Lineman during Maintenance Work
Password Based Distribution Panel and Circuit Breaker Operation for the Safety of Lineman during Maintenance Work
Security is the prime concern in our day to day life while performing any activity. In the current scenario, accidental death of lineman is often read and evidenced. In this direct...
Usability Study on Textual and Graphical Passwords
Usability Study on Textual and Graphical Passwords
One of the most common methods used for authentication are passwords, in particular textual passwords. However, maintaining multiple textual passwords across various websites or in...

