AbstractAuthentication :
Process to identify someone, usually using username and password, which is used to grant someone’s access to the system object based on their identity. Graphical password : Authentication system that use graphical image as the password on their smart phones or tablet PCs. This project is focusing on the usage of the images and alphanumeric password. As you know, alphanumeric password is vulnerable because it is easy to guess. Users tend to use easy passwords. To secure their smartphones, they must to use difficult password, but it is useless since human’s brain doesn’t quite remember something textual. So, this project will secure the user information from any possible attacks with the idea of the combination of alphanumerical character and images. As for the techniques, this application will use the image based password authentication. The image password will be selected after the user sign up and login to the application. This application will focus on the user that wanting to secure their information from other persons. The outcome for this project is the user will have a secure information. As to conclude, this will give the user a secured and safe with easy-to-use application and it will be at the users satisfactory. |
Introduction
-Nowadays, technologies like computers, tablet PCs, and smartphones as well as information security are the most significant challenge. Authorized users must log in to the system to get access the information. Authorization cannot do without authentication [9]. Authentication is the process to identify someone, usually using username and password, which is used to grant someone’s access to the system object based on their identity [1]. Current authentication methods divided into three categories; token based, bio-metric based and knowledge based.
A graphical password is the authentication system that uses the graphical image as the password. It also called as graphical user authentication (GUA). The graphical password divided into three categories which are recognition-based, pure recall-based and cued recall-based graphical techniques. Knowledge-based authentication is the most common authentication method that includes both textual and graphical techniques. The textual password like alphanumeric based method categorized as traditional password method. The alphanumeric password is the method that used alphabets, numbers, and characters.
Two-factor authentication (2FA) refers as two-step authentication, a security process that which user are provided with two authentication factors to verify them. The authentication factors are divided into three types; knowledge, possession and inherence factors. Knowledge factors is what the user know such as PIN numbers, passwords or shared secrets. Possession factors is like what the user have, such as ID card, security keys or smartphone. Lastly, inherence factors that called as bio-metric. Bio-metric is the authentication method that using the user physical attributes such as thumbprint, iris reading and many more [3].
A graphical password is the authentication system that uses the graphical image as the password. It also called as graphical user authentication (GUA). The graphical password divided into three categories which are recognition-based, pure recall-based and cued recall-based graphical techniques. Knowledge-based authentication is the most common authentication method that includes both textual and graphical techniques. The textual password like alphanumeric based method categorized as traditional password method. The alphanumeric password is the method that used alphabets, numbers, and characters.
Two-factor authentication (2FA) refers as two-step authentication, a security process that which user are provided with two authentication factors to verify them. The authentication factors are divided into three types; knowledge, possession and inherence factors. Knowledge factors is what the user know such as PIN numbers, passwords or shared secrets. Possession factors is like what the user have, such as ID card, security keys or smartphone. Lastly, inherence factors that called as bio-metric. Bio-metric is the authentication method that using the user physical attributes such as thumbprint, iris reading and many more [3].