WhatsApp at (+91-9098855509) Support
ijprems Logo
  • Home
  • About Us
    • Editor Vision
    • Editorial Board
    • Privacy Policy
    • Terms & Conditions
    • Publication Ethics
    • Peer Review Process
  • For Authors
    • Publication Process(up)
    • Submit Paper Online
    • Pay Publication Fee
    • Track Paper
    • Copyright Form
    • Paper Format
    • Topics
  • Fees
  • Indexing
  • Conference
  • Contact
  • Archieves
    • Current Issue
    • Past Issue
  • More
    • FAQs
    • Join As Reviewer
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

SURVEY ON GRAPHICAL PASSWORD AUTHENTICATION

Mr. J. Jelsteen J. Jelsteen, V. Selvapriya, S. Sufiya Muskan, V. Selvapriya , S. Sufiya Muskan

Download Paper

Paper Contents

Abstract

One method of computer security authentication is the use of a graphic password. The most crucial aspect of computer science nowadays is digitalcomputer security, which protects user or client data. And one of the hazards is shoulder-surfing, in which a thief can steal a password by watching directly or by recording the authentication session. The most popular and straightforward way for this authentication is the graphic password strategy. So, we recommend a fresh approach to address this issue. In order to defend against shoulder surfing attacks, we have created two ideas. initial, If the registration does not already exist, the user must register. Second, you need to enter a user ID and password that are both current. The key phrase is a collection of letters and digits. Third, the user must go through image-based authentication, where the user can select their own password, and this method has a higher probability of working against it. Your password should be chosen in accordance with the registration password; it must match when you log in. There should be numerous color-based passwords used in colour basis authentication, and you must keep track of the password order according to the colour. Similar to three-factor authentication, too. The proposed graphical password authentication method that is suggested here is hence secure to shoulder surfing and other likely attacks

Copyright

Copyright © 2023 Mr. J. Jelsteen, V. Selvapriya, S. Sufiya Muskan. This is an open access article distributed under the Creative Commons Attribution License.

Paper Details
Paper ID: IJPREMS30200005515
ISSN: 2321-9653
Publisher: ijprems
Page Navigation
  • Abstract
  • Copyright
About IJPREMS

The International Journal of Progressive Research in Engineering, Management and Science is a peer-reviewed, open access journal that publishes original research articles in engineering, management, and applied sciences.

Quick Links
  • Home
  • About Our Journal
  • Editorial Board
  • Publication Ethics
Contact Us
  • IJPREMS - International Journal of Progressive Research in Engineering Management and Science, motinagar, ujjain, Madhya Pradesh., india
  • Chat with us on WhatsApp: +91 909-885-5509
  • Email us: editor@ijprems.com
  • Mon-Fri: 9:00 AM - 5:00 PM

© 2025 International Journal of Progressive Research in Engineering, Management and Science.Designed and Developed by EVG Software Solutions All Rights Reserved.

Terms & Conditions | Privacy Policy | Publication Ethics | Peer Review Process | Contact Us