Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Graphical Password Authentication

View through CrossRef
A pattern password is an authentication system that works when a user selects images in a specific sequence displayed on a graphical user interface (GUI). For this reason, the graphical password method is called Graphical User Authentication (GUA). The most common way to authenticate a computer is by using an alphanumeric username and password. This method has been shown to have significant drawbacks. For example, users tend to choose passwords that are easy to guess. On the other hand, if a password is difficult to guess, it is often difficult to remember. To overcome these security issues, researchers have developed an authentication method that uses colours and images as passwords. In this research paper, we present a comprehensive overview of existing pattern password methods and introduce our own theory. Graphic cryptosystems have been proposed as a possible alternative to text-based schemes because people can remember colours and images better than text. Colours and Images are usually easier to remember or recognize than text. In this composition, this paper provides a comprehensive overview of existing graphical password ways. These ways fell into two orders: recognition-based and memory-based approaches. Thereafter the strengths and limitations of each approach and coming research directions in this field will be talked over in detail.
Title: Graphical Password Authentication
Description:
A pattern password is an authentication system that works when a user selects images in a specific sequence displayed on a graphical user interface (GUI).
For this reason, the graphical password method is called Graphical User Authentication (GUA).
The most common way to authenticate a computer is by using an alphanumeric username and password.
This method has been shown to have significant drawbacks.
For example, users tend to choose passwords that are easy to guess.
On the other hand, if a password is difficult to guess, it is often difficult to remember.
To overcome these security issues, researchers have developed an authentication method that uses colours and images as passwords.
In this research paper, we present a comprehensive overview of existing pattern password methods and introduce our own theory.
Graphic cryptosystems have been proposed as a possible alternative to text-based schemes because people can remember colours and images better than text.
Colours and Images are usually easier to remember or recognize than text.
In this composition, this paper provides a comprehensive overview of existing graphical password ways.
These ways fell into two orders: recognition-based and memory-based approaches.
Thereafter the strengths and limitations of each approach and coming research directions in this field will be talked over in detail.

Related Results

Cross-Domain Feature Enhancement-Based Password Guessing Method for Small Samples
Cross-Domain Feature Enhancement-Based Password Guessing Method for Small Samples
As a crucial component of account protection system evaluation and intrusion detection, the advancement of password guessing technology encounters challenges due to its reliance on...
An Enhanced Graphical Password Technique Using Fake Pointers
An Enhanced Graphical Password Technique Using Fake Pointers
Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset, such as person, community, nation, or organization. Thus, the det...
Pixel Value Graphical Password Scheme: Identifying Design Features and Requirements
Pixel Value Graphical Password Scheme: Identifying Design Features and Requirements
Pixel value graphical password scheme was introduced with the aim to solve problems faced by users during authentication process that arising from current graphical password scheme...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
E-Authentication System using QR Code and OTP
E-Authentication System using QR Code and OTP
This paper proposes an authentication system that combines One-Time Password (OTP) and Quick Response (QR) code technologies to enhance security and user experience. The system gen...
Machine Learning Based Password Strength Analysis
Machine Learning Based Password Strength Analysis
Passwords, as the most used method of authentication because to its ease of implementation, allow attackers to get access to the accounts owned by others by means of cracking passw...

Back to Top