Abstract

Technology has developed to a very great extent, and the use of smart systems has introduced an increasing threat to data security and privacy. Most of the applications are built-in unsecured operating systems, and so there is a growing threat to information cloning, forging tampering counterfeiting, etc. This will lead to an un-compensatory loss for end-users particularly in banking applications and personal data in social media. The shoulder surfing attack in an assault that can be achieved with the aid of the adversary to accumulate the individual’s password by way of searching over the client’s shoulder as he enters his password. As conventional password schemes are vulnerable to Shoulder Surfing, Steganography and Cryptography proposed three shoulder surfing resistant graphical password schemes. However, most of the current graphical password schemes is liable to shoulder-browsing a recounted hazard wherein an attacker can seize a password by means of way of direct statement or by recording the authentication consultation. Because of the visual interface, shoulder-browsing becomes an exacerbated problem in graphical passwords. A graphical password is easier than a textual content-based password for the majority to undergo in thoughts. Suppose an eight-man or woman password is critical to benefit access into a specific computer network. Sturdy passwords may be produced which might be proof against guessing, dictionary assault. Key-loggers, shoulder surfing and social engineering. Graphical passwords have been utilized in authentication for mobile phones, ATM machines, E-transactions.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call