Authentication Schemes for Session Passwords Using Color and Images

Authors

  • Harnee K P  UG Scholar, Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
  • Nivetha J  Assistant Professor, Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
  • Pavithra D  
  • Selvapriya R  
  • Ms. K. Veena  

Keywords:

Authenticatin, Colors, Credentials, Password, Graphical Password, Images.

Abstract

Authentication is the first and the most important step in information security. It is used to authenticate the user identity. Where user need to memorize their password and remember at login time. Normally user use textual password to provide security, but textual passwords are vulnerable to many cyber-attacks, Such as - dictionary attacks, shoulder surfing etc. Graphical password schemes are used to overcome these problems. A Session password is a new technique based on the graphical password in which we using combination of text, color and images to solve the problem of security. Every time session password can be used to create password for user authentication, by this technique we can overcomes the attacks like shoulder surfing, dictionary attacks. We can use this method for PDAs (Personal Digital Assistants). A multitude of graphical based password scheme which have been proposed as alternative to text based password scheme, motivated by the promise of improved password memorability and thus usability. This paper presents a detailed evaluation of the various Authentication schemes which provides high level of security and provides security to your folder. It consists of three authentication methods like text, picture and colors for providing higher security.

References

  1. Dec 2009, H. Gao proposed paper on “graphical password scheme using color login”.
  2. In May 2011, M. Sreelatha proposed Hybrid Textual Authentication Scheme.
  3. Er. Aman Kumar, Er. Naveen Bilandi, Department of Computer Science and Engineering, DAV University, Jalandhar, Punjab, India “Graphical Password Based Authentication Based System for Mobile Systems”.
  4. Miss.Swati Tidke, Miss Nagama Khan, Miss.Swati Balpande Computer Engineering, RTM Nagpur university, M.I.E.T Bhandara, “Password Authentication Using Text and Colors”.
  5. Veena Rathanavel, Swati Mali, Student M. Tech, Department of Computer Engineering, K J Somaiya, College of Engineering Mumbai, “Graphical Password as an OTP”.
  6. In 2017 Aayush Dilipkumar Jain, Ramkrishna Khetan Krishnakant Dubey, Prof. Harshali Rambade K. Elissa, Department of Information Technology Vidyalankar Institute of Technology, Mumbai, “Color Shuffling Password Based Authentication”
  7. Tsai, Y.C. and Yang, C.H., 2013. Physical forensic acquisition and pattern unlock on Android smart phones. In Future information communication technology and applications (pp. 871-881). Springer, Dordrecht.
  8. Tsai, Y.C. and Yang, C.H., 2013. Physical forensic acquisition and pattern unlock on Android smart phones. In Future information communication technology and applications (pp. 871-881). Springer, Dordrecht.
  9. Chaitanya, G.K. and Raja Sekhar, K., 2021. Verification of pattern unlock and gait behavioural authentication through a machine learning approach. International Journal of Intelligent Unmanned Systems.
  10. Saxena, N., Uddin, M.B., Voris, J. and Asokan, N., 2011, March. Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags. In 2011 IEEE International Conference on Pervasive Computing and Communications (PerCom) (pp. 181-188). IEEE.
  11. Hintze, D., Hintze, P., Findling, R.D. and Mayrhofer, R., 2017. A large-scale, long-term analysis of mobile device usage characteristics. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 1(2), pp.1-21.
  12. Ibrahim, N. and Sellahewa, H., 2017, February. Touch gesture-based authentication: A security analysis of pattern unlock. In 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA) (pp. 1-8). IEEE.
  13. Marques, D., Guerreiro, T., Duarte, L. and Carriço, L., 2013, September. Under the table: tap authentication for smartphones. In 27th International BCS Human Computer Interaction Conference (HCI 2013) 27 (pp. 1-6).
  14. Løge, M.D., 2015. Tell me who you are and i will tell you your unlock pattern (Master's thesis, NTNU).
  15. Aviv, A.J., Maguire, J. and Prak, J.L., 2016. Analyzing the impact of collection methods and demographics for android’s pattern unlock. In Proc. Workshop on Usable Security (USEC). Internet Society.
  16. Syukri study based on Authentication by drawing signature using mouse, Journal of Computers, vol.5, no.5 May 2010.

Downloads

Published

2021-04-30

Issue

Section

Research Articles

How to Cite

[1]
Harnee K P, Nivetha J, Pavithra D, Selvapriya R, Ms. K. Veena "Authentication Schemes for Session Passwords Using Color and Images" International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011,Volume 8, Issue 2, pp.542-548, March-April-2021.