Authors: Sarveshkumar Jaiswal, Tejas Chore, Kamalesh Patil, Kunal Jagtap
DOI Link: https://doi.org/10.22214/ijraset.2023.52462
Certificate: View Certificate
In the modern day, graphical password authentication that relies on memory or recognition is a different and still developing sort of authentication. The user copies the picture or is able to identify the image that was used or made during the registration process. Only authorised users are able to access resources and information thanks to passwords. The newest fashion is graphic passwords, which appear to be a highly promising authentication technique. It is available as a substitute for text passwords. The most popular method is using usernames and passwords that are alphanumeric. While this method has certain benefits over plain text passwords, it also has some drawbacks. Users strive to memorise short, strong passwords that can be broken when using alphanumeric passwords, but doing so becomes cumbersome. Users that use graphical passwords save a picture or certain areas of an image as their password. Biometrics is now the most sophisticated and secure form of authentication, yet it is too costly for widespread usage. Graphical passwords are a fantastic alternative authentication mechanism since they are less expensive, more secure, and simpler for everyone to use. 
Text-based passwords are the foundation of password-based authentication. Text-base password have grown to be significant component of security and continue to do so. Users can choose to authenticate using text or picture passwords. Text passwords are useful for users and simple to remember. Text-based passwords have the drawback of being subject to a variety of assaults. dictionary attack, DOS attack, and eavesdropping attack. To address these issues with text passwords, graphical passwords were devised. Based on the notion that graphical passwords offer several benefits over text-based passwords, this study developed a technique. These authentication methods' effectiveness is predicated on or counsels against susceptible attacks. These areas are pertinent to this project.
II. OVERVIEW OF AUTHENTICATION
Information and communication technology has brought about great changes in the way information is handled. It has a positive impact on most sectors such as the economy, manufacturing, government and even tourism. A platform is being developed to manage most of the world's data. The platform is characterized by speed, reliability, robust and high performance.
Security are a major concern when it is comes to accessing, transferring, and storing data. Security threats come in many forms. Developers, programmers, and even end users need to take good care to preserve information and data .
Human factors were identified by Patrick et al.  as the computer system's weakest security link. The three main areas where humans should actively interact with computers are in the areas of authentication, security operation, and secure system building. Authentication is the main topic here.
Since we're talking about authentication, it's important to know that this is a process when a user requests services from the system by presenting a form of identification. Only after the system accepts the credentials that have been provided may a user be approved [Michael Burrows, Martin Abadi, and Roger Needham, 1990]. Verifying one's identity is another name for authentication [Kurose and Ross, 2003].
The three main categories of modern authentication methods are:
Based on recognition, the user must accurately identifies or recognises the photographs or images throughout the registration procedure.
2. Token-based authentication is based on what you own or possess and is defined or decided accordingly. Taking into account the likes of a driver's licence, identification card likes a college ID, etc. allowing the user to enter their usernames or user ID and password in order to receive a token that allows them to utilise or request system resources This approach also incorporates the usage of knowledge based to increase security. examples are PIN-based ATM cards. 
III. OVERVIEW OF GRAPHICAL PASSWORD
The conventional authentication method, which relied on the username and password, has several flaws and has been used by users up to this point. The primary challenge is keeping track of numerous text passwords. Studies have shown that people prefer passwords that are short and simple to remember. These passwords, along with the accounts they are associated with, are easily hackable. Biometrics is an alternatives to this text-based username and password. But we will only pay attention to the graphical passwords today.
According to psychological research, people prefer to remember visuals better than text, which is the inspiration for the invention of graphical passwords. A graphical password requires more password space than a text password but offers better defence against dictionary attacks. Therefore, graphic passwords are utilised on many mobile devices as well as for workstation and website log-in.Graphic Password, mainly into two types:
The remainder of the material is divided into the following sections: A review of the literature is given in Section II, an example of the approach is given in Section III, and the results are given (or a request for system resources is made) in Section IV.
This strategy combine the use of knowledge-base methods with security. examples are PIN-based ATM cards.
IV. LITERATURE SURVEY
Draw a Secret, an invention of Jemyn et al. , allows users to generate passwords that are completely unique. A platform with a 2D grid basis is provided for the user to design the straightforward image in Figure 1. The user is eager to redo the image during authentication. Only when the photo goes through the same grids in the registration step can the user be verified. Benefits: Grid is a simple object; no additional displays are necessary. Cons: Since it's only a drawing, there's a chance that the grid or sequence at authentication won't match..
The password is highly challenging to crack because to Wiedenbeck et al .'s strategy of choosing a triangle to cover a particular area of the image password space, as illustrated in Fig. 2. The password surface is crowded and challenging to locate, which is an advantage. Cons: Convex surfaces require a lengthier assignment procedure..
Zheng et al.  described a method in which the user is instructed to choose a form that is simple for him or her to recall. Any shape, such as a numerical shape, a geometric shape, or any other random shape, can be used for this form, as seen in Fig 3. If there is a standard for choosing a form, it should be that the user can easily remember the shape. The user should click the grid interface once they are done and happy with the selected form in order to follow the proper stroke order. The system will then record the user's password as the order of the shape and stroke sequences. However, there are still some issues with the system. The user will first select the simplest sequence because this technique for generating passwords based on the sequence of keyboard strokes is extremely challenging and would look challenging to the general public. Second, the initial password generation process is more likely to include human mistake than the login process does. Finally, it takes a while to complete a login. 
Syukri et al.  created a system in which the final stage of authentication is the user's mouse-drawn signature. This approach comprises two separate phases: registration and verification. During the registration procedure, the user will use the mouse to create their signature, which the system will later record. During the verification stage, the system receives this signature as input, does normalisation, and extracts all the parameters. The emergence of duplicate signatures is a problem. When doing so for verification, it is very challenging and frequently impossible to precisely recreate a mouse-drawn signature. 
A two-step graphical password authentication system based on Pass faces was proposed by Grinal Tuscano et al. in . Text and images have been blended to create a system that is simple to use and hard to hack. Text and graphics are combined in a secure system that is simple to use and hard to crack. Users' initial photo selections are especially vulnerable to guessing attacks. There is a slim chance that the attacker will guess the photographs even if they have no prior knowledge about the user. The distortion method depicted in Fig. 5 can reduce the danger of attacks using group guesses that profit from biases in users' selections of authentication photographs. displayed in Fig. 5 can mitigate the danger of group educated guess attacks that take use of biases in users' selections of authentication photos. 
As seen in Fig. 6, Man, et al.  created an algorithm to fend off shoulder surfing assaults. A substantial number of images are chosen by the user to serve as pass-objects in this algorithm. There are several variations of each so-called pass-object, and each variation has a unique special code. Upon logging in, the user is given access to a number of options and tasks.Every single scene is made up of a sizable number of pass items (each taking the shape of a randomly selected version) and several fake objects. Here, the user must provide both a specific code designating each of the several pass-object variations that are present in the scene and a code designating the pass objects' placement in respect to a pair of eyes. A password like this is very difficult to guess, even with a video recorder, as there is no mouse click to expose the password's specifics. The alphanumeric code for each pass-object must still be kept in mind by the method's user. 
We created a graphical password in this post that is a lot more safe than plain text or alphanumeric passwords. Alphanumeric passwords were challenging to remember, but plaintext passwords were weak and could not survive assaults. A graphical password that we created increases authentication security. B. Strictly maintain the section that contains all of the circle photos. Images can be chosen in any convenient order for the user. This demonstrates that graphical passwords may be susceptible to dictionary attacks, such as, If a hacker notices the area where the alignment is done, they will be able to view the image for the password cracking. 3 * 3 * 3 different combinations are conceivable. However, we also increased email security. An encrypted key will be given to the user\'s email address when the image has been placed. This key must be entered to complete the last step of the login process. Your password can be cracked by an attacker, but you don\'t hold the key. A user will be alerted to an impending attack if they get an unexpected email that contains an encrypted key. The user will thus have another opportunity to save his account. The highest level of protection and most danger are undoubtedly provided by graphic passwords and encrypted key layers.
 Manjula Shenoy K and Supriya A. 2019. Authentication using alignment of the graphical password. In Proceedings of the Third International Conference on Advanced Informatics for Computing Research (ICAICR \'19). Association for Computing Machinery, New York, NY, USA, Article 21, 1–5. https://doi.org/10.1145/3339311.3339332  A. S. Patrick, A. C. Long, and S. Flinn, “Hci and security systems,” in CHI’03 Extended Abstracts on Human Factors in Computing Systems, pp 1056-1057,ACM 2003.  X. Suo, Y. Zhu, and G. S. Owen, “Graphical passwords: A survey,” in Computer security applications conference, 21st annual, IEEE, 2005.  I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, “The design and analysis of graphical passwords.,” USENIX Association, 1999.  S. Wiedenbeck, J. Waters, L. Sobrado, and J.-C. Birget, “Design and evaluation of a shoulder-surfing resistant graphical password scheme,” in Proceedings of the working conference on Advanced visual interfaces, pp. 177–184, ACM, 2006.  Z. Zheng, X. Liu, L. Yin, and Z. Liu, “A stroke-based textual password authentication scheme,” in Education Technology and Computer Science, 2009. ETCS’09. First International Workshop on, vol. 3, pp. 90–95, IEEE, 2009.  A. F. Syukri, E. Okamoto, and M. Mambo, “A user identification system using signature written with mouse,” in Australasian Conference on Information Security and Privacy, pp. 403–414, Springer, 1998.  M. G. Tuscano and A. Tulasyan, “Graphical password authentication using pass faces,” International Journal of Engineering Research and Applications, vol. 5, no. 3, pp. 60–64, 2015.  S. Man, D. Hong, and M. M. Matthews, “A shoulder-surfing resis-tant graphical password scheme-wiw.,” in Security and Management, pp. 105–111, Citeseer, 2003.  A. Danish, L. Sharma, H. Varshney, and A. M. Khan, “Alignment based graphical password authentication system,” in Computing for Sustainable Global Development (INDIACom), 2016 3rd International Conference on, pp. 2950– 2954, IEEE, 2016.  N. A. A. Othman, M. A. A. Rahman, A. S. A. Sani and F. H.  M. Ali, \"Directional Based Graphical Authentication Method with Shoulder Surfing Resistant,\" 2018 IEEE Conference on Systems, Process and Control (ICSPC), 2018, pp. 198-202, doi: 10.1109/SPC.2018.8704157.  Haichang, G., Zhongjie, R., Xiuling, C., Xiyang, L., & Aickelin, U. “A New Graphical Password Scheme resistant to shoulder surfing”, International Conference on CyberWorlds. University of Nottingham, 20-22 October 2010
Copyright © 2023 Sarveshkumar Jaiswal, Tejas Chore, Kamalesh Patil, Kunal Jagtap. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET52462
Publish Date : 2023-05-18
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here