Professional Documents
Culture Documents
Author
Arun Prakash
Description
• A graphical password is an authentication system that works by having the user select from
images, in a specific order, presented in a graphical user interface(GUI).
Disadvantage
Author
Haichang Gao
Description
• Computer security depends on the user authentication method, and alphanumeric password is
the most widely used method to protect users' privacy.
• However, users tend to choose short and simple passwords which will be broken easily, while
secure passwords are difficult to remember.
Disadvantage
Author
Ron Poet
Description
• Recognition-based graphical password (RBGP) schemes are not easily compared in terms
of security.
• In this method uses many different measures which results in confusion as to whether RBGP
schemes are secure against guessing and capture attacks.
Disadvantage
Author
Wei Hu
Description
• Graphical password has not been widely used in practical. Most of the graphical password
authentication schemes are only discussed in laboratory.
• In some typical graphical password authentication schemes are introduced, and the security of
them are analyzed according to its estimate criterions.
Disadvantage
Author
Description
• This aims to study the usability features of the recognition base graphical password methods
available and extract the usability features of the existing methods.
Disadvantage
Author
Description
• Security and privacy of both institutions and individuals have always been a major concern.
Authentication systems received significant attention from both researchers and practitioners.
• The most common authentication mechanisms used nowadays are the alphanumeric-based
schemes.
Disadvantage
Author
Subhradeep Biswas
Description
• This proposes a password security system that allows the host not to store the passwords of its
users at its end.
• Instead it creates and stores a derivative of the password with the help of a bitmap image
uploaded by the user during the user creation process.
• Disadvantage
Pass-Matrix authentication
Author
Shums Tabrez
Description
• Security play’s a prominent role in the protection of people’s vital information from varied
system attacks. So as a solution to these problems there should be some form of authentication
protection.
• Most of the system user prefer textual password in the application of security and privacy for
their computer system.
• Disadvantage
Text based password.
Review of Literature
Title
Author
Andrea Bianchi
Description
• PassBYOP is a new graphical password scheme for public terminals that replaces the static
digital images typically used in graphical password systems with personalized physical tokens,
herein in the form of digital pictures displayed on a physical user-owned device such as a
mobile phone
Disadvantage
Author
Sachin Kaja
Description
• a security scheme with the help of Graphical Password which uses images. The main goal of
this project is to support the users in selecting better and safe passwords. The user will click on
a particular part of the image to confirm authentication.
• The persuasive cued clicked points will provide a series of images so that security increases as
it will give a workload for the intruders.
Disadvantage
persuasive cued clicked points Failed Sometimes .
Existing System
different registers.
Since all the transactions are stored in different registers it takes for transaction
using One time Pin password method and Single Transaction passwords.
The security for the user accounts by protecting with the user choice Random Pin
with the Random Dialer keypad based passwords anti shoulder - surfing attack
concept.
Select individual Rpin in the collection of database and give input as the count by
the customer and using this Rkeypad and password PIN for transaction.
User Rpin is not recognized in the Shoulder surfer attackers customer database
Rdialer keypad based count cannot monitor by the attacker is considered as one of
the best solutions.
:
Architecture
HARDWARE & SPECIFICATION
SOFTWARE SPECIFICATION
RAM : 1 GB