Open Access Open Access  Restricted Access Subscription Access

Survey of Graphical Password Authentication Systems Suitable for Android Application

D. Loganathan, Umme Kulsum, Arbaz Ahamed, Sania M, Shakthi S

Abstract


The introduction of android devices has changed the way the people live resulting in more interaction with android devices than ever before . Indeed we frequently access android devices in public places .The most commonly used authentication method in mobile devices is textual password. Textual password are more error prone and time consuming .A complicated textual password are difficult to memorize and remember. Textual password results in key logger attacks ,So to address these issues a wide range of Graphical schemes have been developed. shoulder surfing is possible with traditional password systems. A wide variety of graphical password methods have been developed, each with varying degrees of shoulder surfing resistance. This survey paper presents an best authentication scheme for android graphical password app lock. Graphical  passwords are easier to remember as people tends to remember Images faster than text. Thus this type of android app lock increases usability and security. This paper provides an outline of authentication on android devices as app lock and a survey for many graphical password technique at the end of evaluation will get to know the positive and negative outcomes of each paper.


Full Text:

PDF

References


M. N. Hossain, S. F. U. Zaman, T. Z. Khan, S. A. Katha, M. T. Anwar and M. I. Hossain, "Implementing Biometric or Graphical Password Authentication in a Universal Three-Factor Authentication System," 2022 4th International Conference on Computer Communication and the Internet (ICCCI), 2022, pp. 72-77, doi: 10.1109/ICCCI55554.2022.9850264.

H. Adamu, A. D. Mohammed, S. A. Adepoju and A. O. Aderiike, "A Three-Step One-Time Password, Textual and Recall-Based Graphical Password for an Online Authentication," 2022 IEEE Nigeria 4th International Conference on Disruptive Technologies for Sustainable Development (NIGERCON), 2022, pp. 1-5, doi: 10.1109/NIGERCON54645.2022.9803122.

M. Kaushik, A. Rawat, V. Sisaudia and L. Parashar, "A Novel Graphical Password Scheme to Avoid Shoulder-Surfing Attacks in Android Devices," 2022 2nd International Conference on Intelligent Technologies (CONIT), 2022, pp. 1-6, doi: 10.1109/CONIT55038.2022.9848122.

Y. Yin, J. Jang-Jaccard and N. Baghaei, "PassImg: A Secure Password Generation and Management Scheme without Storing," 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD), 2022, pp. 341-346, doi: 10.1109/CSCWD54268.2022.9776045.

B. N. V. V. P. Chimakurthi and K. B. PRAKASH, "Image and Video-based Graphical Password Authentication," 2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT), 2022, pp. 01-08, doi: 10.1109/ICEEICT53079.2022.9768604.

S. S. U. Hasan, A. Ghani, M. Bilal and A. Jolfaei, "Multifactor Pattern Implicit Authentication," in IEEE Consumer Electronics Magazine, vol. 11, no. 1, pp. 26-32, 1 Jan. 2022, doi: 10.1109/MCE.2021.3054328.

S. Rajarajan and P. Priyadarsini, "SelfiePass: A Shoulder Surfing Resistant Graphical Password Scheme," 2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT), 2021, pp. 563-567, doi: 10.1109/RTEICT52294.2021.9573972.

A. HameedShnain, H. M. A. Ghanimi, W. A. Mohammed, M. I. Sabri and S. H. Shaheed, "An Effective Graphical Password Authentication Method in Health Care Sectors," 2021 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA), 2021, pp. 38-41, doi: 10.1109/IICETA51758.2021.9717888.

Manju Mohanan.M; Dr.Loganathan.D; Nisha.M, 2019, “C App - A Mobile App for Crime Report”, International Journal of Computer Science and Network, Vol 8, Issue 3, pp- 294-299

Kannu Priya, Dr. R. Kesavamoorthy, Dr. Raja M, Dr. S. P.Anandaraj, Dr. D. Loganathan, Dr. Thanga Mariappan L, September 2022, “Multimodal Biometrics Authentication Using Thermal Hand Vein and Hand Dorsa” Neuro Quantology , Volume 20, Issue 9 , Pp 3423-3432.


Refbacks

  • There are currently no refbacks.