Beruflich Dokumente
Kultur Dokumente
80
1,3Department
I. INTRODUCTION:
Computer security depends on trustworthy user
authentication to an extent. To provide the same we
have two traditions, first- dextral based passwords, in
which user uses alphabets in upper or small case,
numeric values and special symbols.
The combination of all these values will create a
password more complex. But humans generally
create easy combinations to memorize passwords, but
it affects the security & hard combinations affect
relevance. Remembrance of the image is rather
smooth as compared to the dextral based password.
And to overcome the security & usability issues
instead of dextral based passwords, pictorial based
passwords are widely used. Image based passwords
comprise two actions Recognition and recall. In
recognition user have to select & click on the image,
whereas in recall, it has to identify the pre-selected
image. Various techniques are used for guaranteeing
endorsement such as Smart card, biometric system,
etc., but such system has various drawbacks i.e. value
or hardware requirement. Nevertheless, these
techniques are also challenged with encrypted
questions & users dislike these types of challenges
which offer unnecessary extra step in authentication.
These techniques are sensitive to different types of
attacks such as a dictionary based attack, brute force
attack, spyware attack, human error attacks, etc. So,
all these attacks will be reduced by selecting a strong
password. Strong password means having greater
courage.
II. OUTLINE BIOGRAPHY:
This review paper consists of following survey,
which divides the hidden private data into two parts
such asHidden Private Data
Dextral based
Pictorial based
CONCLUSION:
This paper makes two kinds of contribution. First
relate to security constraint and another is password
persistent. From the related survey, it comes to know
that there are various addresses available to make
user password more secure and memorable, but there
is no proper solution to mitigate different types of
attacks over passwords. Since to make password
stronger and harder to guess pictorial password is the
best solution which makes user convenient to select
password of user own choice.
REFERENCES:
[1] Steven M. Bellovin, Michael Merritt Encrypted Key
Exchange: Password Based Protocol Secure Against
Dictionary Attacks, Symposium on research in security and
privacy (RISP), IEEE 1992. http://dx.doi.org/
10.1109/risp.1992.213269
[2] Tetsuji TAKADA and Hideki KOIKE A wase-E: Image
Based Authentication for Mobile Phones Using users
Favourite Images Lecture notes in Computer Science on
pages 347 to 351, 2003. http://dx.doi.org/10.1007/978-3540-45233-1_26
[3] Monica Chew and J.D Tygar, UC Berkely, Image
Recognition CAPTCHA, 7th international Information
Security Conference, Springer 2004. http://dx.doi.org/
10.1007/978-3-540-30144-8_23
[4] Hen-Tyan Yeh, Bing-Chang Chen, and Tzonelih Hwang
Secure Key Agreement Protocols For Three Party Against
/10.1109/icig.2009.62
[19] Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang Liu,
Uwe Aickelin, A New Graphical Password Scheme
Resistant to Shoulder-Surfing,International Conference on
Cyberworlds (ICC) 2010. http://dx.doi.org/ 10.1109/
cw.2010.34
[20] Yasunori Onda, Seongtlan Shin, Kazukuni Kobara, Hideki
Imai, How to distinguish On-line Dictionary attacks and
Password Mis-typing in Two-Factor Authentication,
International Symposium on Information Theory and Its
Applications (ISITA )IEEE 2010. http:// dx.doi.org/10.1109
/iisita.2010.5649727
[21] M. Martinez-Diaz, C. Martin-Diaz, J. Galbally and J.
Fierrez, A Comparative Evaluation of Finger-Drawn
Graphical Password Verification Methods, 12th
International Conference on Frontiers in Handwriting
Recognition (ICFHR) 2010. http://dx.doi.org/ 10.1109/icfhr
.2010.65
[22] akao Miyachi, Keita Takahashi, Madoka Hasegawa, Yuichi
Tanaka, Shigeo Kato, a study on memorability and
shoulder-surfing robustness of graphical password using
dwt-based image blending 28th Picture Coding Symposium
(PCS)2010. http://dx.doi.org/10.1109 /pcs.2010.5702441
[23] Liming Wang, Xiuling Chang, Zhongjie Ren, Haichang
Gao, Xiyang Liu, Uwe Aickelin, Against Spyware Using
CAPTCHA in Graphical Password Scheme, 24th
international conference on advance information networking
and application (AINA) IEEE 2010 http://dx.doi.org/
10.1109/aina.2010.46
Survey on Different Endorsement Techniques
Proceedings of 4th SARC International Conference, 30th March-2014, Nagpur, India, ISBN: 978-93-82702-70-2
84
[24] R. Padmavathy, A Password Attack On s-3PAKE,
International Journal of Security and its Application, (IJSA)
Vol. 5 No. 4 2011. http://dx.doi.org/10.11591 /ijins.v1i1.385
[25] Wazir Zada Khan, Mohammad Y Aalsalem and Yang
Xiang, Quratulain Arshad A Hybrid Graphical Password
Based System 11th International Conference, ICA 300
2011 http://dx.doi.org/10.1007/978-3-642-24669-2_15
[26] Arash Habibi Lashkari, Azizah Abdul Manaf, A Secure
Recognition Based Graphical Password by Watermarking,
11th International Conference on Computer and Information
Technology (ICCIT) IEEE 2011. http://dx.doi.org/
10.1109/cit.2011.29
[27] Marc luard, Yves Maetz And Davide Alessio, Technicolor,
Action-Based Graphical Password: Click-a-Secret,
International Conference on Consumer Electronics (ICCE)
IEEE 2011. http://dx.doi.org/10.1109/ icce.2011.5722575
[28] Rosanne and Ron Poet, Measuring the Revised
Guessability of Graphical Passwords, 5th International
Conference on Network and System Security (ICNSS),
IEEE 2011. http://dx.doi.org/10.1109/icnss.2011.6060031
[29] Kameswara Rao, Sushma Yalamanchili , Novel ShoulderSurfing Resistant Authentication Schemes using TextGraphical Passwords, International Journal of Information
& Network Security (IJINS) Vol.1, No.3, 2012
http://dx.doi.org/10.11591/ijins.v1i3.529
[30] Mansour Alsaleh, Mohammad Mannan, P.C van Oorschot
member, IEEE Revisiting Defences against Large Scale
Online Password Guessing Attacks, transaction on
Dependable and secure computing (TDSC) Vol.9, No. 1,
IEEE 2012. http://dx.doi.org/10.1109 /tdsc.2011.24
[31] Yuxin Meng, Designing Click-Draw Based Graphical
Password Scheme for Better Authentication, 7th
International Conference on Networking, Architecture, and
Storage (ICNAS) IEEE 2012 http://dx.doi.org/
10.1109/nas.2012.9
[32] Housam Khalifa Bashier, Lau Siong Hoe, Pang Ying Han,
Graphical Password: Pass-Images Edge Detection 9th
International Colloquium on Signal Processing and its