User Authentication Using Grid Based Method

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Grid recognition authentication is a method of securing user logins. This project is based on user authentication in Smartphone using grid, images, and pattern. It is an innovation from the existing security lock that used in the Smartphone. A smartphone usually consists the authentication techniques such as draw a pattern or inserting a password. But nowadays, those techniques are not completely secure because it is very easy to break through different type of attack like brute force, dictionary attack or key logger. In this project, a tool based Grid Based Method will be developed which is important to increase the security of the smartphone that using an iOS platform. By using this tool, the codes are difficult to break because the grids are hidden behind the image. Users can identify the cells that were selected in a grid during the registration stage.

     


  • Keywords


    User authentication; Grid based method; iOS, tool.

  • References


      [1] Biswas SS & Sankar S (2014), Comparative study of graphical user authentication approaches. International Journal of Computer Science and Mobile Computing 3, 361–375

      [2] Agarwal G, Singh S & Shukla RS (2010), Security analysis of graphical passwords over the alphanumeric passwords. International Journal of Pure and Applied Sciences and Technology 1, 60–66.

      [3] Havighurst R (2007), Chapter 1: User identification and authentication concepts. In D. Todorov (Ed.), Mechanics of User Identification and Authentication: Fundamentals of Identity Management. Florida: CRC Press, pp. 1–64.

      [4] Vinothini T, Rajesh I & Kirupa Rani D (2014), Multiple grid based graphical text password authentication. International Journal of Research in Engineering and Technology 3, 502–507.

      [5] Ugochukwu EE & Jusoh YY (2013), A review on the graphical user authentication algorithm: Recognition-based and recall-based. Journal of Information Processing and Management 4, 238–252.

      [6] Bhanushali A, Mange B, Vyas H, Bhanushali H & Bhogle P (2015), Comparison of graphical password authentication techniques. International Journal of Computer Applications 116, 11–14.

      [7] Dunphy P & Yan J (2007), Do background images improve draw a secret graphical passwords? Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 36–47.


 

View

Download

Article ID: 11442
 
DOI: 10.14419/ijet.v7i2.14.11442




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.