EduLadder(ELADR) - CRYPTO

This is designed to incentify community members as a proof of contribution token.


Using this You can,Buy courses,Reward others and exchange for real money.


WHITE PAPER COURSES

Real Problems! Real Experts!

Join Our Telegram Channel !


The Eduladder is a community of students, teachers, and programmers. We help you to solve your academic and programming questions fast.
In eduladder you can Ask,Answer,Listen,Earn and Download Questions and Question papers.
Watch related videos of your favorite subject.
Connect with students from different parts of the world.
Apply or Post Jobs, Courses ,Internships and Volunteering opportunity. For FREE
See Our team
Wondering how we keep quality?
Got unsolved questions? Ask Questions


You are here:Open notes-->Seminar-topics-and-ppt-for-engineering-->--graphical-password-authentication

graphical password authentication

How to study this subject



Graphical password schemes have been proposed as a possible alternative to text-based schemes, motivated partially by the fact that humans can remember pictures better than text; psychological studies supports such assumption. Pictures are generally easier to be remembered or recognized than text. In addition, if the number of possible pictures is sufficiently large, the possible password space of a graphical password scheme may exceed that of text-based schemes and thus presumably offer better resistance to dictionary attacks. Because of these advantages, there is a growing interest in graphical password. In addition to workstation and web log-in applications, graphical passwords have also been applied to ATM machines and mobile devices.

Dhamija and Perrig proposed a graphical authentication scheme based on the HashVisualization technique . In their system, the user is asked to select a certain number of images from a set of random pictures generated by a program . Later, the user will be required to identify the pre selected images in order to be authenticated. The results showed that 90% of all participants succeeded in the authentication using this technique, while only 70% succeeded using text-based passwords and PINS. The average log-in time, however, is longer than the traditional approach. A weakness of this system is that the server needs to store the seeds of the portfolio images of each user in plain text. Also, the process of selecting a set of pictures from the picture database can be tedious and time consuming for the user.

Sobrado and Birget developed a graphical password technique that deals with the shoulder-surfing problem. In the first scheme, the system will display a number of pass-objects (pre-selected by user) among many other objects. To be authenticated, a user needs to recognize pass-objects and click inside the convex hull formed by all the pass-objects.In order to make the password hard to guess, Sobrado and Birget suggested using 1000 objects, which makes the display very crowded and the objects almost indistinguishable, but using fewer objects may lead to a smaller password space, since the resulting convex hull can be large.


Content Tags : graphical password authentication seminar report, graphical password authentication pdf, graphical password authentication ppt, graphical password authentication doc, graphical password authentication technology

Official Notes


Add contents here

Notes from other sources


GRAPHICAL PASSWORD AUTHENTICATION.doc

Model question papers


Add contents here

Previous year question papers


Add contents here

Useful links


Add contents here

Editors

neenu2neenu2RajivRajiv


You might like this video:Watch more here

Watch more videos from this user Here

Learn how to upload a video over here