A Knowledge Based Graphical Authentication Using X and Y Coordinates
H.Faumia2, B.Abirami2, K.Muthulakshmi3, M.Kasthuri4
1H.Faumia,Pursuing B.E degree in Tejaa Shakthi Institute of Technology For Women, Coimbatore, Tamil Nadu, India.
2B.Abirami, Pursuing B.E degree in Tejaa Shakthi Institute of Technology For Women, Coimbatore, Tamil Nadu, India.
3K.Muthulakshmi, Pursuing B.E degree in Tejaa Shakthi Institute of Technology For Women, Coimbatore, Tamil Nadu, India.
4M.Kasthuri, Pursuing B.E degree in Tejaa Shakthi Institute of Technology For Women, Coimbatore, Tamil Nadu, India.

Manuscript received on March 02, 2014. | Revised Manuscript received on March 03, 2014. | Manuscript published on March 05, 2014. | PP: 163-165 | Volume-4 Issue-1, March 2014. | Retrieval Number: A2124034114/2014©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Graphical authentication is more efficient and more securable. An important usability goal for knowledge based authentication systems is to support user in selecting passwords for higher security in the sense of being from an expanded effective security space. Here we are using x and y coordinates to choose a picture password. Additionally the pictures in x and y coordinates are changing randomly and hence it is difficult to find the original picture. In our base paper the approaches used are “Persuasive cued click points”,” Cued click points” and “Pass points”. Main tools used here are pccp, viewport and that is used for password creation. Viewport approaches are used to memorable user chosen password and secure system generated random password that are difficult to remember. The pccp creating a less guessable password is the easiest course of action. In order to avoid “Shoulder surfing” algorithm we are going for AES (Advanced encryption standard).
Keywords: Authentication, Security, Graphical Passwords, Knowledge-based .