Open Access Open Access  Restricted Access Subscription Access

Password Authentication Systems

Sujata .

Abstract


People's lives have changed as a result of the introduction of Android devices, which has led to more interaction with Android devices than ever before. Indeed, we frequently access Android devices in public settings. The textual password is the mobile device authentication method that is utilized most frequently. Literary secret key are more blunder inclined and tedious .A muddled printed secret phrase are hard to retain and recall. Printed secret phrase brings about key lumberjack assaults ,So to resolve these issues a great many Graphical plans have been created. shoulder surfing is conceivable with conventional secret word frameworks. A wide assortment of graphical secret phrase techniques have been grown, each with shifting levels of shoulder riding obstruction. This study paper presents a best verification plot for android graphical secret word application lock. Because people tend to remember images more quickly than text, graphic passwords are easier to remember. Hence this kind of android application lock expands convenience and security. This paper gives a diagram of confirmation on android gadgets as application lock and a review for some graphical secret word method toward the finish of assessment will get to know the positive and adverse results of each paper.


Full Text:

PDF

References


M. N. Hossain, S. F. U. Zaman, T. Z. Khan, S. A. Katha, M. T. Anwar and M. I. Hossain, "Implementing Biometric or Graphical Password Authentication in a Universal Three-Factor Authentication System," 2022 4th International Conference on Computer Communication and the Internet (ICCCI), 2022, pp. 72-77, doi: 10.1109/ICCCI55554.2022.9850264.

H. Adamu, A. D. Mohammed, S. A. Adepoju and A. O. Aderiike, "A Three-Step One-Time Password, Textual and Recall-Based Graphical Password for an Online Authentication," 2022 IEEE Nigeria 4th International Conference on Disruptive Technologies for Sustainable Development (NIGERCON), 2022, pp. 1-5, doi: 10.1109/NIGERCON54645.2022.9803122.

M. Kaushik, A. Rawat, V. Sisaudia and L. Parashar, "A Novel Graphical Password Scheme to Avoid Shoulder-Surfing Attacks in Android Devices," 2022 2nd International Conference on Intelligent Technologies (CONIT), 2022, pp. 1-6, doi: 10.1109/CONIT55038.2022.9848122.

Y. Yin, J. Jang-Jaccard and N. Baghaei, "PassImg: A Secure Password Generation and Management Scheme without Storing," 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD), 2022, pp. 341-346, doi: 10.1109/CSCWD54268.2022.9776045.

B. N. V. V. P. Chimakurthi and K. B. PRAKASH, "Image and Video-based Graphical Password Authentication," 2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT), 2022, pp. 01-08, doi: 10.1109/ICEEICT53079.2022.9768604.

S. S. U. Hasan, A. Ghani, M. Bilal and A. Jolfaei, "Multifactor Pattern Implicit Authentication," in IEEE Consumer Electronics Magazine, vol. 11, no. 1, pp. 26-32, 1 Jan. 2022, doi: 10.1109/MCE.2021.3054328.

S. Rajarajan and P. Priyadarsini, "SelfiePass: A Shoulder Surfing Resistant Graphical Password Scheme," 2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT), 2021, pp. 563-567, doi: 10.1109/RTEICT52294.2021.9573972.

A. HameedShnain, H. M. A. Ghanimi, W. A. Mohammed, M. I. Sabri and S. H. Shaheed, "An Effective Graphical Password Authentication Method in Health Care Sectors," 2021 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA), 2021, pp. 38-41, doi: 10.1109/IICETA51758.2021.9717888.

Manju Mohanan.M; Dr.Loganathan.D; Nisha.M, 2019, “C App - A Mobile App for Crime Report”, International Journal of Computer Science and Network, Vol 8, Issue 3, pp- 294-299

Kannu Priya, Dr. R. Kesavamoorthy, Dr. Raja M, Dr. S. P.Anandaraj, Dr. D. Loganathan, Dr. Thanga Mariappan L, September 2022, “Multimodal Biometrics Authentication Using Thermal Hand Vein and Hand Dorsa” Neuro Quantology , Volume 20, Issue 9 , Pp 3423-3432.


Refbacks

  • There are currently no refbacks.