2020
DOI: 10.1002/spy2.140
|View full text |Cite
|
Sign up to set email alerts
|

Secure graphical password based on cued click points using fuzzy logic

Abstract: Nowadays authentication technology is the most important means to ensure security. Alphanumeric username and password procedure is the most common authentication method. Users typically choose memorable passwords that are easy for attackers to guess, and assigned passwords by the system are difficult for users to remember. We present a graphical password based on cued recall in which is secured from shoulder surfing attack. Also, we propose an image encryption technique using a 2D cat map and edge detection te… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Users are required in the login phase to select the same regions in a specific order, as shown in Fig. 3(a) [79]. The blonder method resists brute-force attacks because it contains millions of regions that can be selected as passwords [80].…”
Section: B Graphical Passwordsmentioning
confidence: 99%
See 1 more Smart Citation
“…Users are required in the login phase to select the same regions in a specific order, as shown in Fig. 3(a) [79]. The blonder method resists brute-force attacks because it contains millions of regions that can be selected as passwords [80].…”
Section: B Graphical Passwordsmentioning
confidence: 99%
“…This approach showed that 90% of the participants succeeded in the authentication by using this technique, while only 70% succeeded by using text-based passwords [90]. The main disadvantage of this technique is that it takes a long time to log in because storing a large number of pictures causes a delay in transferring over the network, thus delaying the authentication process [79]. The story mechanism is comparable to the Passfaces method; it presents images of places, people, or everyday objects, as shown in Fig.…”
Section: B Graphical Passwordsmentioning
confidence: 99%
“…Typically, password entropy does not measure the generated password security. But it's conceptually related to the difficulty of the password random guessing [16], [25]. And it's usually calculated as:…”
Section: Password Entropymentioning
confidence: 99%
“…where N represents the number of the digits in the password, L represents the number of possible digits that can be used to create the password [16], [25].…”
Section: Password Entropymentioning
confidence: 99%
See 1 more Smart Citation