Graphical password based mouse behavior technique
نویسندگان
چکیده
منابع مشابه
Graphical Authentication Using Region Based Graphical Password
Password authentication is failing as an authentication since it increases the user burden to remember the passwords. Graphical authentication is proposed as a alternative for textual passwords since it may be easy for users to remember.In this paper we propose a new image region selection based graphical password scheme. We are going to present a new technique for authentication which is based...
متن کاملHaptic-Based Sensible Graphical Password
Authentication, the process of identifying an individual, currently plays a critical role in security systems. Graphical password schemes are believed to be more secure and resilient to dictionary attacks than traditional textual passwords. We designed a graphical password system with the novelty of incorporating the sense of touch via haptic technologies. Using haptics, the system utilizes the...
متن کاملA Vision Based Graphical Password
Graphical password is an authentication means alternative to textual password and biometric password. Graphical passwords are classified into two groups: picture based password and userdrawn based password. To pass the authentication, in the picture based graphical password, users have to choose right photos whereas in the user-drawn based graphical password, users have to draw correct pictures...
متن کاملA Hybrid Graphical Password Based System
In this age of electronic connectivity, where we all face viruses, hackers, eavesdropping and electronic fraud, there is indeed no time when security is not critical. Passwords provide security mechanism for authentication and protection services against unwanted access to resources. A graphical based password is one promising alternatives of textual passwords. According to human psychology, hu...
متن کاملPersuasive Cued Click Based Graphical Password with Scrambling For Knowledge Based Authentication Technique with Image Scrambling
Adequate user authentication is a persistent problem, particularly with handheld devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization’s influence. Yet, these devices are being used increasingly in corporate settings where they pose a security risk, not only by containing sensitive information, but also by providing the means ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Physics: Conference Series
سال: 2021
ISSN: 1742-6588,1742-6596
DOI: 10.1088/1742-6596/1755/1/012021