Shruthi B S et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.4, April- 2023, pg. 42-46 © 2023, IJCSMC All Rights Reserved 42 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320088X IMPACT FACTOR: 7.056 IJCSMC, Vol. 12, Issue. 4, April 2023, pg.42 46 USER AUTHENTICATION USING EYE-BLINK PASSWORD Shruthi B S; Manasa K B Assistant Professors Department of Information Science and Engineering The National Institute of Engineering, Mysuru Email Id: shruthinieit@gmail.com; mansi.harshi@gmail.com DOI: https://doi.org/10.47760/ijcsmc.2023.v12i04.004 Abstract- Personal identification numbers (PINS) are used to authenticate a user for security purpose. In order to authenticate himself the user should physically input the PIN, which might be susceptible to password cracking via shoulder surfing or thermal tracking. Authenticating a PIN with hands-off eye blinks PIN entry techniques, on the opposite hand, offers a safer password entry option by not leaving any physical footprints behind. User authentication using eye-blink password refers to finding the attention blinks in sequential image frames, and generation of PIN. This paper presents an application with three layer authentication system that are face detection, PIN entry by eye blink and OTP (One Time Password) to avoid thermal tracking attacks and shoulder surfing. Keywords: shoulder surfing, LBPH, Cascade classifiers 1. INTRODUCTION One of the safety requirements for general terminal authentication systems is to be easy, fast and secure as people face authentication mechanisms through password. But, these techniques aren‟t safe because they're viewed by malicious observers who use surveillance techniques like shoulder-surfing (observation user while typing the password through the keyboard) to capture user authentication data. Also there are security problems due to poor interactions between systems and users. As a result, the researchers proposed eye tracking systems, where users can enter the password by watching the acceptable symbols within the appropriate order and thus the user is invulnerable to shoulder surfing. The aim of this paper is to review techniques to handle eye movement tracking in security systems.