29-08-2016, 09:59 AM
1451238099-86.docx (Size: 377.38 KB / Downloads: 5)
A B S T R A C T
Textual passwords generally are used for authentication. Graphical password is introduced opposite techniques to textual passwords. As most users are more familiarized with textual passwords than pure graphical passwords. Shoulder-surfing is a known risk where an attacker can capture a password by direct show or by listening the authentication session. Text can be combined with alphabet, digit, images or colors to generate session passwords for authentication. Session password can use only once time because every time a new password is generate. Session Password is support graphical password schemes and Pair based scheme is both secure and efficient. In this paper, we propose an improved text-based shoulder surfing resistant graphical password scheme by using graphical and pair based scheme is used for alphabet, digit or symbols The user can easily and efficiently login system. Proposed system we analyze the security and usability of the proposed scheme, and show the support of the scheme to shoulder surfing and accidental login.
Keywords: - Secret Pass Key, Shoulder Surfing, Brute Force Attack, Guessing, Dictionary attacks, Graphical Scheme, Pair Based scheme, Session password.
I. INTRODUCTION
The Shoulder surfing attacks can perform by password over a shoulder at the time of user entering password. Graphical passwords are proposed scheme as a useful authentication method. Which are increasingly used with their small size, compact deployment and low cost? The vulnerabilities of this method like dictionary attack, social engineering and shoulder surfing are known. Random passwords can make the system is easy and secure. But the main difficulties of this remembering or guessing those passwords are easily. The opposite techniques are graphical passwords and pair based. These two techniques have their own drawbacks. Biometrics, finger prints, iris scan introduced but not yet generally used. The major disadvantage of this approach is that such systems can be costly and the identified process can be slow. But most of them suffer from shoulder surfing which is becoming quite a large problem. There are graphical password schemes that have been proposed which are support to shoulder surfing but have their own drawbacks is taking more time for user to login or usability issues.
II. LITERATURE SURVEY
Dhamija and Perrig proposed a graphical authentication scheme where the user has to identify the predefined images to prove user's authenticity. In this system, the user selects a certain number of images from a set of random pictures during registration. Later, during login the user has to identify the pre selected images for authentication from a set of images. This system is vulnerable to shoulder-surfing.