Loading

GPAS – Graphical Password Authentication System for Software Privacy Protection
S.Geetha1, N.Thilagavathi2, A.Nivedha shree3, M.Subalakshmi4

1S. Geetha, Department of Computer Science and Engineering, V.S.B Engineering College, Karur (TamilNadu), India.

2N. Thilagavathi, Department of Computer Science and Engineering, V.S.B Engineering College, Karur (TamilNadu), India.

3A. Nivedha Shree, Department of Computer Science and Engineering, V.S.B Engineering College, Karur (TamilNadu), India.

4M. Subalakshmi, Department of Computer Science and Engineering, V.S.B Engineering College, Karur (TamilNadu), India.

Manuscript received on 05 April 2019 | Revised Manuscript received on 12 April 2019 | Manuscript Published on 26 July 2019 | PP: 226-229 | Volume-8 Issue-6S4 April 2019 | Retrieval Number: F10450486S419/19©BEIESP | DOI: 10.35940/ijitee.F1045.0486S419

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Now daily’s larger part of PC frameworks, passwords is the technique for decision for validating clients. A procedure by which a framework confirms the personality of a client is known as ‘Confirmation’. Confirmation may likewise be summed up by saying that “to validate” signifies “to approve”. Confirmation is the main line of resistance against trading off classification and uprightness. The most generally and normally utilized confirmation is conventional “Username” and “Secret phrase”. For such verification by and large content (alphanumeric) is utilized. It is outstanding, in any case, that passwords are defenseless to assault: clients will in general pick passwords that are anything but difficult to recollect, and regularly this implies they are likewise simple for an assailant to get via hunting down hopeful passwords. Token and biometric based validation frameworks were presented as an option for those plans. Be that as it may, these plans are all around expensive. Consequently, Graphical plan was acquainted as a variety with the login/secret key plan. In this paper we investigate a way to deal with client confirmation that sums up the idea of a literary secret key and that, as a rule, improves the security of client verification over that given by printed passwords. In this proposed framework we have utilized another system for confirmation. It is a variety to the login/secret phrase plan utilizing graphical secret phrase utilized in a graphical way. We have presented a structure of our proposed Graphical Password Authentication System (GPAS), which is resistant to the basic assaults endured by other confirmation plans.

Keywords: Computer Systems, Authentication, Alpha-Numeric, Password Attack, Graphical Password Authentication System (GPAS).
Scope of the Article: Computer Science and Its Applications