Web Based Graphical Password Authentication System

Authors

  • Raziya Begum, Gopalapuram Poojitha, Ramdas Vankdothu

Keywords:

In order to provide security and assurance, programs commonly make use of verification that is dependent on passwords.

Abstract

In order to provide security and assurance, programs commonlymake use of verification that is dependent on passwords. This isdone for the aim of providing security. However, human behaviors,such as selecting terrible passwords and supplying passwords insquare measurements, are considered to be "the most delicateassociation" in the verification chain. This is because human beingsare the ones who are responsible for these activities. As analternative to alphanumeric strings that are optional, it is feasiblethat consumers will select passwords that are either short ornecessary in order to facilitate quick remember. Both of theseoptions are available to them. The expansion of web applicationsand portable applications has made it possible for individuals toutilize these programs from a broad variety of devices at any timeand from any location. This is possible because of the fact that theseprograms are portable. In spite of the fact that this new innovationprovides an extraordinarily high level of simplicity, it also raises thepossibility that a password could be divulged to bear riding attacks.An adversary can readily identify or use recording equipment that ispositioned outside of the client's location in order to obtain theclient's credentials. For the purpose of avoiding problems of thissort, it is essential for us to make use of an alternative method ofconfirmatory communication. Another method of authenticationthat can be applied in this situation is graphical authentication. Theusage of the picture secret word is the most efficient approach formanaging sign-on, which is less complicated than the process ofmemorizing and generating passwords that are basic. This methodis the most effective method. The process of signing in can becompleted by tapping the relevant places or performing theappropriate gestures over a picture that has been pre-selected. Bothof these methods are acceptable.

Downloads

Published

2024-09-21

How to Cite

Raziya Begum, Gopalapuram Poojitha, Ramdas Vankdothu. (2024). Web Based Graphical Password Authentication System. International Journal of Communication Networks and Information Security (IJCNIS), 16(4), 748–760. Retrieved from https://ijcnis.org/index.php/ijcnis/article/view/7202

Issue

Section

Research Articles