Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/580294
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2024-08-02T08:33:12Z-
dc.date.available2024-08-02T08:33:12Z-
dc.identifier.urihttp://hdl.handle.net/10603/580294-
dc.description.abstractIn the field of computer and information security has emerged as a critical challenge. Access to the system or information should be limited to individuals who have been granted authorization. The process of authorization is dependent on the prior completion of authentication. There are several ways accessible for authentication in this context. One of the most often used and straightforward methods is the password procedure. The purpose of a password is to restrict access to a computer or information only to individuals who have been authorized to view or access it. The subject of this discussion pertains to graphical password systems, which serve as an alternative to the traditional alphanumeric login and password authentication technique. The utilization of images as passwords in visual password systems is a prevalent practice. This webpage provides a comprehensive overview of the many methodologies currently employed within this domain. The use of graphical passwords has been extensively studied as a more secure authentication method compared to textual passwords. These passwords offer enhanced strength and ease of recall. Numerous apps already employ authentication techniques that utilize image and graphical passwords. However, authentication systems encounter challenges in effectively managing graphical or image data. In order to include the user input image or graphical password into the extensive database, it is necessary to introduce a deliberate delay in the authentication process. newline newlineIn this thesis used color, shape and texture based graphical password authentication system to prevent and secure data. And for that use different techniques like histogram, mutual information, color spacing and RGB moment to extract and fetch meaningful feature and also for shape considered edge detection approaches like sobel, canny and other morphological operator for extract feature. So consider different methods and techniques to provide robust and efficient graphical password authentication using proposed model.
dc.format.extent
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleStudy and Design of Graphical Password Authentication Schemes
dc.title.alternative
dc.creator.researcherModi, Hetal
dc.subject.keyword
dc.subject.keywordAutomation and Control Systems
dc.subject.keywordComputer Science
dc.subject.keywordEngineering and Technology
dc.description.note
dc.contributor.guideSoni, Nayan
dc.publisher.placeAhmedabad
dc.publisher.universitySabarmati University
dc.publisher.institutionPure and Applied Sciences
dc.date.registered2019
dc.date.completed2023
dc.date.awarded2023
dc.format.dimensions
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Pure & Applied Sciences

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File119.8 kBAdobe PDFView/Open
02_prelim pages.pdf392.65 kBAdobe PDFView/Open
03_content.pdf140.41 kBAdobe PDFView/Open
04_abstract.pdf32.44 kBAdobe PDFView/Open
05_chapter 1.pdf557.37 kBAdobe PDFView/Open
06_chapter 2.pdf437.69 kBAdobe PDFView/Open
07_chapter 3.pdf625.99 kBAdobe PDFView/Open
08_chapter 4.pdf1.82 MBAdobe PDFView/Open
09_chapter 5.pdf1.98 MBAdobe PDFView/Open
10_annexures.pdf131.99 kBAdobe PDFView/Open
80_recommendation.pdf107.4 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: