Survey Paper onLive Object for Securing Graphical Password

Abstract

To provide more security to the cloud system, Live Object for a securing graphical password is a new graphical password scheme for public terminals that replaces the static digital images typically used in graphical password systems with personalized physical tokens, here in the form of digital pictures displayed on a physical user-owned device such as a mobile phone. Users represent these images to a system camera and then enter their password as a sequence of selections on live video of the token. Highly distinctive optical features are extracted from these selections and used as the password. We present three feasibility studies of Live Object for a securing graphical password examining its reliability, usability, and security against observation. The reliability study shows that image feature based passwords are viable and suggests appropriate system thresholds password items should contain a minimum of seven features, 40 percent of which must geometrically match originals stored on an authentication server in order to be judged equivalent. The usability study measures task completion times and error rates, revealing these to be 7.5 and 9 percent, broadly comparable with prior graphical password systems that use static digital images. The safety study highlights Live Object for a securing graphical password resistance to observation attack 3 attackers are unable to compromise a password using shoulder surfing, camera based observation, or malware. If everything will be fine then only the secure access to the cloud is granted.

Authors and Affiliations

Keywords

Related Articles

Minimax Estimation of the Scale Parameter of the Laplace Distribution under Different Loss Function

In this paper, we obtained Minimax estimators of the scale parameter θ for the Laplace distribution under different loss function by applying the theorem of Lehmann [1950]. Some Bayes estimators for the unknown scale par...

NB Classifier Analysis among the Meteorological and Solar Activity Parameters

Climatologically approach is used to investigate the links between Solar and climate parameters between 1971-2000. We have plotted the cost benefit analysis curve between rainfall, temperature, sunspot number and geomagn...

Symbolic Pattern Analysis Method for PCB Defect Detection and Classification

According to recent advancements in manufacturing industries, Printed Circuit Boards and other components require depth inspection for better quality of product manufacturing. Electronic components are manufactured massi...

Sum Square Difference Product Prime Labeling of Some Cycle Related Graphs

Sum square difference product prime labeling of a graph is the labeling of the vertices with {0,1,2---------,p-1} and the edges with absolute difference of the square of the sum of the labels of the incident vertices an...

Solving Linear Algebraic Equations Using Inverse with Identity Matrix and Gauss Elimination Methods

The application of matrix used to solve linear system of equations can give more information about the nature of systems of linear equations than the numerical values of the unknowns. Solving linear equations simultaneou...

Download PDF file
  • EP ID EP649712
  • DOI -
  • Views 183
  • Downloads 0

How To Cite

(2018). Survey Paper onLive Object for Securing Graphical Password. International Journal of Emerging Technologies in Computational and Applied Sciences, 23(1), -. https://www.europub.co.uk/articles/-A-649712