A Prevention of data theft such as bank account numbers, credit
card information, passwords, work related documents, etc. is
essential in today’ communication systems, since many of our
daily activities depend on the security of the data networks.
Although Graphical Authentication Systems have been playing
an important role in balking various kinds of bot attacks by
acting as an additional mechanism over alphanumeric passwords,
yet they have not been used for human authentication to its full
potential. By exploiting its feature of easy memorability and the
possibility of quadrillion permutation and combination of images
that could form the graphical password, an independent human
authentication system can be made. Thus, Graphical Password by
Segmentation of Image is one such system that attempts to
exploit the aforementioned criteria. This system segments the
image like a grid, which has a maximum of 8 columns and 8
rows. Then, each segment of the image is dragged in a particular
sequence onto an empty grid of size 8x8 and placed on a
particular segment of the empty grid, to form the user’ password.
If the user chooses to shuffle the segments during registration,
the image segments will be presented in a shuffled manner when
the user logs into the system and the user needs to drag each
segment of the image onto the same empty grid of size 8x8 in the
correct sequence and position of the segments that user had
specified during registration.
Rupali Deshmukh : Department of Information Technology, Fr. C. Rodrigues Institute of Technology, Vashi
Navi Mumbai, Maharashtra, India,400703.
Smita Rukhande : Department of Information Technology, Fr. C. Rodrigues Institute of Technology, Vashi
Navi Mumbai, Maharashtra, India,400703.
Data Theft, Communication Systems,
Security, Bot Attacks, Alphanumeric Password,
Graphical Password, Memorability
Graphical passwords offers better security than textbased
passwords because many people, in an attempt to
memorize text-based passwords, use plain words rather
than the recommended jumble of characters. A
dictionary search can often hit on a password and allow
a hacker to gain entry into a system in seconds. But in a
series of selectable images, possible combinations that
could form the graphical password are so many that it
would take millions of years to break into the system.
[1] Rashika Koul, Tanya Kumar, Radhika Malpani, Ashwini
Dhongade, Rupali Deshmukh, “GPSI: Graphical
Password by Segmentation of Image” International
Journal of Research and Scientific Innovation (IJRSI) |
Volume III, Issue XI, November 2016 | ISSN 2321-
2705
[2] Ronald Fisher, Frank Yates [1938]. Statistical tables for
biological, agricultural and medical research (3rd ed.).
[3] Margaret Rouse, “ graphical password or graphical user
authentication (GUA)”.
[4] Xiaoyuan Suo , Ying Zhu, G. Scott Owen, “ Graphical
Passwords: A Survey.”, DOI: 10.1109/CSAC.2005.27 ·
Source: DBLP Conference: 21st Annual Computer
Security Applications Conference (ACSAC 2005), 5-9
December 2005, Tucson, AZ, USA
[5] Haiyu Song, Xiongfei Li , Pengjie Wang, Jingrun Chen,
“ Block-Based Normalized-Cut Algorithm for Image
Segmentation”, Online ISBN 978-3-642-05173-9
[6] J. C. Birget, D. Hong N. Memon, S. Man and S.
Wiedenbeck., “The Graphical Passwords Project”
Funded by the NSF Cyber Trust Program.
[7] Ahmet Emir Dirik, Nasir Memon, Jean-Camille Birget,
“Modeling user choice in the PassPoints graphical
passwordscheme”
[8] Arash Habibi Lashkari, Samaneh Farmand, Dr. Rosli
Saleh, Dr. Omar Bin Zakaria, “A wide-range survey on
Recall-Based Graphical User Authentications algorithms
based on ISO and Attack Patterns ”, (IJCSIS)
International Journal of Computer Science and
Information Security, Vol. 6, No. 3, 2009
[9] Saranya Ramanan, Bindhu J S, “A Survey on Different
Graphical Password Authentication Techniques”,
International Journal of Innovative Research in
Computer and Communication Engineering (An ISO
3297: 2007 Certified Organization) Vol. 2, Issue 12,
December 2014
[10] Arti Bhanushali, Bhavika Mange, Harshika Vyas, Hetal
Bhanushali and Poonam Bhogle, “Comparison of
Graphical Password Authentication Techniques”,
International Journal of Computer Applications (0975 –
8887) Volume 116 – No. 1, April 2015
[11] Ibrahim Furkan Ince, Ilker Yengin, Yucel Batu Salman,
Hwan-Gue Cho, Tae-Cheon Yang, “DESIGNING
CAPTCHA ALGORITHM: SPLITTING AND
ROTATING THE IMAGES AGAINST OCRs”, Third
2008 International Conference on Convergence and
Hybrid Information Technology.