Graphical Password Using an Intuitive Approach

In this modern age of increasing interconnectivity, information security has come to occupy a pivotal position in recent research works. The vast expanse of Internet and human–computer interaction has created new threats of unauthorized access and data ex

  • PDF / 404,532 Bytes
  • 9 Pages / 439.37 x 666.142 pts Page_size
  • 39 Downloads / 275 Views

DOWNLOAD

REPORT


Abstract In this modern age of increasing interconnectivity, information security has come to occupy a pivotal position in recent research works. The vast expanse of Internet and human–computer interaction has created new threats of unauthorized access and data exploitation. Traditional methods of authentication have been text-based password schemes. However, the major drawback with them has been the fact that their strength varies inversely with user convenience. Users generally tend to select passwords that are easier to recall and shorter in length. This, though, makes them vulnerable to cracking attempts. A graphical password is a confirmation framework that works by having the client select pictures, in a particular order. Graphical passwords have inherent advantages over conventional textual password schemes. In this paper, we propose one such graphical password methodology which makes use of the distinct shape, color, and type of image a user chooses, for the purpose of authentication. Keywords Authentication

 Graphical password  Security

R. Mahey (&)  N. Singh  C. Kumar  N. Bhagwat  P. Verma Computer Science and Engineering Department, Bharati Vidyapeeth College of Engineering, New Delhi, India e-mail: [email protected] N. Singh e-mail: [email protected] C. Kumar e-mail: [email protected] N. Bhagwat e-mail: [email protected] P. Verma e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2018 S.S. Dash et al. (eds.), International Conference on Intelligent Computing and Applications, Advances in Intelligent Systems and Computing 632, https://doi.org/10.1007/978-981-10-5520-1_15

153

154

R. Mahey et al.

1 Introduction Recent years have seen a huge growth in computer interconnectivity. It is almost impossible for any organization to exist without networking capabilities. Huge amount of sensitive and non-sensitive data are flowing around the world every second. Information sensitivity and constant data exchange have led to the creation of a number of authentication schemes. User authentication has come to be of prime importance in securing data repositories. Authentication has become the central idea in providing a safeguard between data and its unintended access. A number of people have been interested in exploring and creating new, stronger, and user-friendly authentication schemes. One of the earliest methods has been to use textual passwords for authentication. Users are required to recreate a text pattern that they had originally selected, to gain access to data. Textual passwords are easy to implement and provide a fair deal of security. The strength of a text-based password depends on its length and randomness of its characters: A longer password with more randomly generated characters is safer against cracking attempts. However, this very fact poses a problem for the user. The user is usually tempted to select a pattern that is easier to recall, which means that more often than not, the user will either choose an insufficiently long pattern or will opt for a more pre