International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 4 94 - 97 _______________________________________________________________________________________ 94 IJRITCC | April 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Graphical Password Scheme Using Cued Click Point and Persuasion with Multiple Images Ansari Sarim Department of Information Technology Rajiv Gandhi Institute of Technology Mumbai, India Rokade Jayesh Department of Information Technology Rajiv Gandhi Institute of Technology Mumbai, India Khan Ishan Department of Information Technology Rajiv Gandhi Institute of Technology Mumbai, India Shaikh Adil Department of Information Technology Rajiv Gandhi Institute of Technology Mumbai, India Govind Wakure Department of Information Technology Rajiv Gandhi Institute of Technology Mumbai, India AbstractThere are three main categories of authentication system token-based (what you have), biometric-based (who you are) and knowledge-based (what you know). Cued Click Point is a graphical password scheme which is a type of knowledge based authentication. In CCP, user clicks on one point per picture for an arrangement of pictures.CCP gives more prominent security than PassPoints in light of the fact that the quantity of pictures builds the workload for attackers. The proposed system uses persuasion allowing user’s choice to a certain extent while encouraging users towards stronger and less-vulnerable passwords.In the proposed system, the undertaking of choosing less secure passwords (which are simple for attackers to hack) is more monotonous, disheartening users from settling on such decisions.In actuality, this approach makes picking a more secure secret key less weight on clients, it is less demanding to take after the framework's recommendations for a protected passwordan element lacking in many systems. CCP is an effective alternative to text-based passwords and other forms of traditional authentication system. Psychological studies have also revealed that human mind can recognize images faster than text and numbers. CCP can be applied to a system front-end which requires high level of security.This paper presents implementation of Cued Click Point (CCP) graphical password which uses persuasion along with multiple images. Keywords-User Authentication, Cued Click Point, Tolerance, Graphical Password, Persuauion _______________.__________________________________*****_________________________________________________ I. Introduction Different graphical passwordschemehas been proposed as contrasting options to text based passwords. Research and experience have demonstrated that text based passwords are laden with both ease of use and security issues that make them not as much as alluring options. Brain science have uncovered that the human mind is better at perceiving and reviewing pictures than content. Graphical passwords are planned to gain by this human trademark with the expectation that by diminishing the memory load on clients, combined with a bigger full secret key space offered by pictures, more secure passwords can be delivered. A watchword comprises of a single click point for each picture for an arrangement of pictures. The following picture showed depends on the past snap point so clients get prompt certain input with respect to whether they are on the right way when signing in. CCP offers both enhanced ease of use and security rehearses to adapt. In this venture, we propose another snap based graphical secret key plan called Persuasive Cued Click Point with Multiple Images. It helps clients rapidly make and re-enter their passwords. Another element of CCP is the quick certain input telling the right client whether their most recent snap point was effectively entered. Persuasive Technology - Persuasive Technology was first articulated by Fogg as using technology to motivate and influence people to behave in a desired manner. An authentication system which applies Persuasive Technology should guide and encourage users to select stronger passwords, but not impose system-generated passwords. To be effective, the users must not ignore the persuasive elements and the resulting passwords must be memorable. As detailed below, PCCP accomplishes this by making the task of selecting a weak password more tedious and time consuming. The path of least resistance for users is to select a stronger password (not comprised entirely of known hotspots or following a predictable pattern). The formation of hotspots across users is minimized since click-points are more randomly distributed. PCCP’s design follows Fogg’s Principle of Reduction by making the desired task of