Survey on Authentication Password Techniques
Priti Jadhao1, Lalit Dole2
1Priti Jadhao, CSE Department G.H .Raisoni College of Engineering, Nagpur, India.
2Priti Jadhao, CSE Department G.H .Raisoni College of Engineering, Nagpur, India.
Manuscript received on April 06, 2013. | Revised Manuscript received on April 29, 2013. | Manuscript published on May 05, 2013. | PP: 67-68 | Volume-3, Issue-2, May 2013. | Retrieval Number: B1430053213/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Authentication is process of determining whether someone or something is ,in fact who or what to be declared. For authentication mostly textual passwords are used. Passwords are the most commonly used method for identifying users in computer and communication systems. Typically, passwords are strings of letters and digits, i.e., they are alpha-numeric. Such passwords have the disadvantage of being hard to remember. Graphical passwords, which consist of some actions that the user performs on an image. Such passwords are easier to remember, but are vulnerable to shoulder surfing (which consists of simply watching a user login). We present a few graphical password schemes that offer resistance to shoulder surfing.
Keywords: Graphical Password , Session Password, Textual Password.