SHOULDER SURFING OF RESISTANT GRAPHICAL PASSWORD

Download Article
Dr.S.Brilly Sangeetha, Dr. Wilfred Blessing N R, Bernard H. Ugalde, Suresh Palarimath, Dr. M.Pyingkodi

ABSTRACT: Passwords are widely used when accessing computers, networks, accounts and websites. A big drawback of password is called password problem which is not being resist against several password attacks such as guessing, dictionary attack, key- loggers, shoulder-surfing and social engineering. Other than being secure against these attacks passwords should be easy to remember. Usability and security are two important issues to be concerned about while working with passwords. Graphical passwords seem to be the solution as it. A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). Despite the high standards of Graphical Passwords, they are still vulnerable to some kinds of attacks. The goal is to propose a new Graphical Password scheme that takes advantage of graphical input displays capabilities to achieve better security than text-based passwords. The proposed research is an approach to enhance the existing Graphical Password techniques and resist against attacks like Shoulder Surfing. This system can be improved to provide a wider password space if more server variables are involved. Since conventional password schemes are vulnerable to shoulder surfing, many shoulder surfing resistant graphical password schemes have been proposed. However, as most users are more familiar with textual passwords than pure graphical passwords, text-based graphical password schemes have been proposed. Unfortunately, none of existing text-based shoulder surfing resistant graphical password schemes is both secure and efficient enough. In this paper, an improved text-based shoulder surfing resistant graphical password scheme by using color is introduced. In the proposed scheme, shoulder surfing attack is not possible and the user can login to the system easily and efficiently.

Shoulder surfing, Dictionary attack, Key- loggers, Authentication, Graphical user interface, Graphical password