Loading

Graphical User Authentication Techniques for Security: a Comparative Study
Harinandan Tunga1, Diya Saha2

1Harinandan Tunga, Department of Computer Science & Engineering, RCC Institute of Information Technology, Kolkata (W.B), India.
2Diya Saha, Department of Computer Science & Engineering, RCC Institute of Information Technology, Kolkata (W.B), India.

Manuscript received on 15 June 2015 | Revised Manuscript received on 25 June 2015 | Manuscript Published on 30 June 2015 | PP: 38-41 | Volume-4 Issue-5, June 2015 | Retrieval Number: A5486108118/15©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Nowadays, user authentication is one of the important topics in information security. Strong text-based password schemes could provide with certain degree of security. However, the fact that strong passwords are difficult to memorize often leads their owners to write them down on papers or even save them in a computer file. Graphical User Authentication (GUA) has been proposed as a possible alternative solution to text-based authentication, motivated particularly by the fact that humans can remember images better than text. In recent years, many networks, computer systems and Internet based environments try used graphical authentication technique for their user’s authentication. All of graphical passwords have two different aspects which are usability and security. Different techniques for GUA have been proposed in literature over the past few years such asRecognition Based Technique[2], Recall Based Technique[2]. This paper presents a survey of comparative study between different techniques of GUA.
Keywords: Graphical User Authentication, Recognition Based Techniques, Recall Based Techniques.

Scope of the Article: Pattern Recognition