Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/580294
Title: Study and Design of Graphical Password Authentication Schemes
Researcher: Modi, Hetal
Guide(s): Soni, Nayan
Keywords: 
Automation and Control Systems
Computer Science
Engineering and Technology
University: Sabarmati University
Completed Date: 2023
Abstract: In the field of computer and information security has emerged as a critical challenge. Access to the system or information should be limited to individuals who have been granted authorization. The process of authorization is dependent on the prior completion of authentication. There are several ways accessible for authentication in this context. One of the most often used and straightforward methods is the password procedure. The purpose of a password is to restrict access to a computer or information only to individuals who have been authorized to view or access it. The subject of this discussion pertains to graphical password systems, which serve as an alternative to the traditional alphanumeric login and password authentication technique. The utilization of images as passwords in visual password systems is a prevalent practice. This webpage provides a comprehensive overview of the many methodologies currently employed within this domain. The use of graphical passwords has been extensively studied as a more secure authentication method compared to textual passwords. These passwords offer enhanced strength and ease of recall. Numerous apps already employ authentication techniques that utilize image and graphical passwords. However, authentication systems encounter challenges in effectively managing graphical or image data. In order to include the user input image or graphical password into the extensive database, it is necessary to introduce a deliberate delay in the authentication process. newline newlineIn this thesis used color, shape and texture based graphical password authentication system to prevent and secure data. And for that use different techniques like histogram, mutual information, color spacing and RGB moment to extract and fetch meaningful feature and also for shape considered edge detection approaches like sobel, canny and other morphological operator for extract feature. So consider different methods and techniques to provide robust and efficient graphical password authentication using proposed model.
Pagination: 
URI: http://hdl.handle.net/10603/580294
Appears in Departments:Pure & Applied Sciences

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File119.8 kBAdobe PDFView/Open
02_prelim pages.pdf392.65 kBAdobe PDFView/Open
03_content.pdf140.41 kBAdobe PDFView/Open
04_abstract.pdf32.44 kBAdobe PDFView/Open
05_chapter 1.pdf557.37 kBAdobe PDFView/Open
06_chapter 2.pdf437.69 kBAdobe PDFView/Open
07_chapter 3.pdf625.99 kBAdobe PDFView/Open
08_chapter 4.pdf1.82 MBAdobe PDFView/Open
09_chapter 5.pdf1.98 MBAdobe PDFView/Open
10_annexures.pdf131.99 kBAdobe PDFView/Open
80_recommendation.pdf107.4 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: