International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 02 | Feb-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 449 AUTHENTICATION SYSTEM OVERVIEW OF GRAPHICAL PASSWORDS Ms.DHIVIYAA.S 1 , Ms.RAKSHITHA.K.R 2 , Ms.VIJAYABHARATHI.R 3 1 Assistant Professor, Department of Computer Applications and Master of Software Systems, Sri Krishna Arts and Science College, Coimbatore, India 2,3 Student, Department of Computer Applications and Master of Software Systems, Sri Krishna Arts and Science College, Coimbatore, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Nowadays, user authentication is one of the significant topics in information security. Text-based strong password schemes could provide with a certain stage of security. However, the fact that strong passwords being difficult to memorize often leads their owners to write them down on papers or even deliver them in a computer file. Graphical authentication was proposed as an alternative to text passwords as it is easy to remember and provides better security. Nowadays graphical techniques are used for authentication by many networks, computer systems, and Internet-based environments. This paper presents a review of the recognition based and recall based authentication algorithms and finally describing the proposed systems called cued click points and persuasive click points for better security using graphical passwords. Key Words: Token, Biometric, Textual passwords, Graphical passwords, Recall based algorithms, Recognition based algorithms 1. INTRODUCTION In recent years, computer and network security have been developed as a technical problem. A central area in security research is the authentication which is the determination of whether a user should be allowed access to a given system or resource. In this respect, the password is a common and widely authentication method still practiced up to now. A password is a form of secret authentication information that is used to control access to a resource. It is kept confidential from those not allowed access, and those wishing to gain access are tested on whether or not they know the password and are granted or denied access accordingly. In modern times, passwords are used to moderate access to protect computer operating systems, mobile phones, auto teller machine (ATM) machines, and others. Passwords may also be required by users for many purposes such as logs into computer accounts, recovering email from servers, accessing of files, databases, networks, and websites. Some drawbacks of normal password appear like stolen the password, forgetting the password, and a weak password. Thus, a big necessity to have a strong authentication method is needed to secure all our applications as possible. Today, another method such as graphical authentication is one of the potential alternative solutions. Psychological studies have demonstrated that people can remember pictures better than text passwords hence graphical passwords are believed to be a good alternative for text passwords. Images are generally easier to be remembered or recognized than text, especially photos, which are even easier to be remembered than random pictures. 2. AUTHENTICATION TECHNIQUES The process of identifying a person by username and password is called as authentication. Authentication methods can be divided into three types such as token- based, biometric-based and knowledge-based. 2.1. TOKEN-BASED AUTHENTICATION In this technique cards like smart cards, ATM cards, credit cards, etc., are mostly used for authentication purpose 2.2. BIOMETRIC BASED AUTHENTICATION In biometric authentication technique for security purpose fingerprints, iris, and facial expressions are used as words. Sometimes the voice is likewise used for security purpose. This furnishes a strong security system, but it requires highly expensive devices. 2.3. KNOWLEDGE BASED AUTHENTICATION In this knowledge-based authentication, text-based password and graphical passwords are utilized. TEXT PASSWORDS The commonly used authentication technique is text password. In this, the sequence of characters is applied as the password. The text password is very easy to get around. Thus in order to make a strong character password symbols, numbers, and other special characters should be added. Length of character is also a keen concern. GRAPHICAL PASSWORDS In graphical password system user have to select from images in a particular order that is presented in the graphical user interface. Graphical passwords were originally described by Blonder. In his description, an image may appear on the screen and the user would click on the image if right places are clicked then the user will be