International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 02 | Feb-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 449
AUTHENTICATION SYSTEM – OVERVIEW OF GRAPHICAL PASSWORDS
Ms.DHIVIYAA.S
1
, Ms.RAKSHITHA.K.R
2
, Ms.VIJAYABHARATHI.R
3
1
Assistant Professor, Department of Computer Applications and Master of Software Systems, Sri Krishna Arts and
Science College, Coimbatore, India
2,3
Student, Department of Computer Applications and Master of Software Systems, Sri Krishna Arts and Science
College, Coimbatore, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Nowadays, user authentication is one of the
significant topics in information security. Text-based strong
password schemes could provide with a certain stage of
security. However, the fact that strong passwords being
difficult to memorize often leads their owners to write them
down on papers or even deliver them in a computer file.
Graphical authentication was proposed as an alternative to
text passwords as it is easy to remember and provides better
security. Nowadays graphical techniques are used for
authentication by many networks, computer systems, and
Internet-based environments. This paper presents a review of
the recognition based and recall based authentication
algorithms and finally describing the proposed systems called
cued click points and persuasive click points for better security
using graphical passwords.
Key Words: Token, Biometric, Textual passwords,
Graphical passwords, Recall based algorithms,
Recognition based algorithms
1. INTRODUCTION
In recent years, computer and network security have been
developed as a technical problem. A central area in security
research is the authentication which is the determination of
whether a user should be allowed access to a given system
or resource. In this respect, the password is a common and
widely authentication method still practiced up to now. A
password is a form of secret authentication information that
is used to control access to a resource. It is kept confidential
from those not allowed access, and those wishing to gain
access are tested on whether or not they know the password
and are granted or denied access accordingly. In modern
times, passwords are used to moderate access to protect
computer operating systems, mobile phones, auto teller
machine (ATM) machines, and others. Passwords may also
be required by users for many purposes such as logs into
computer accounts, recovering email from servers, accessing
of files, databases, networks, and websites. Some drawbacks
of normal password appear like stolen the password,
forgetting the password, and a weak password. Thus, a big
necessity to have a strong authentication method is needed
to secure all our applications as possible. Today, another
method such as graphical authentication is one of the
potential alternative solutions. Psychological studies have
demonstrated that people can remember pictures better
than text passwords hence graphical passwords are believed
to be a good alternative for text passwords. Images are
generally easier to be remembered or recognized than text,
especially photos, which are even easier to be remembered
than random pictures.
2. AUTHENTICATION TECHNIQUES
The process of identifying a person by username and
password is called as authentication. Authentication
methods can be divided into three types such as token-
based, biometric-based and knowledge-based.
2.1. TOKEN-BASED AUTHENTICATION
In this technique cards like smart cards, ATM cards, credit
cards, etc., are mostly used for authentication purpose
2.2. BIOMETRIC BASED AUTHENTICATION
In biometric authentication technique for security purpose
fingerprints, iris, and facial expressions are used as words.
Sometimes the voice is likewise used for security purpose.
This furnishes a strong security system, but it requires
highly expensive devices.
2.3. KNOWLEDGE BASED AUTHENTICATION
In this knowledge-based authentication, text-based
password and graphical passwords are utilized.
TEXT PASSWORDS
The commonly used authentication technique is text
password. In this, the sequence of characters is applied as
the password. The text password is very easy to get around.
Thus in order to make a strong character password symbols,
numbers, and other special characters should be added.
Length of character is also a keen concern.
GRAPHICAL PASSWORDS
In graphical password system user have to select from
images in a particular order that is presented in the
graphical user interface. Graphical passwords were
originally described by Blonder. In his description, an image
may appear on the screen and the user would click on the
image if right places are clicked then the user will be