Security Analysis Method of Recognition-Based Graphical Password

2015 ◽  
Vol 72 (5) ◽  
Author(s):  
Touraj Khodadadi ◽  
Mojtaba Alizadeh ◽  
Somayyeh Gholizadeh ◽  
Mazdak Zamani ◽  
Mahdi Darvishi

One of the most important primitive security mechanisms is the authentication system. Authentication through the use of password is a commonly utilized mechanism for authentication of users. In general, users utilize characters as their password; however, passwords based on texts are hard to recall and if the passwords are too simple and predictable, then there is the danger of being susceptible to threats. In order to overcome the problems with authentication, an alternative and new approach has been introduced utilizing images for passwords. The idea gains support from the knowledge that the human’s brain is highly capable of remembering many detailed images, however remembering texts are more difficult. Users who utilize the graphic authentication carry out certain functions on the images such as to click, drag, and movement of the mouse and so on. This research reviews several common Recognition-Based graphical password methods and analyzes their security based on the estimation criteria. Moreover, the research defines a metric that would make it possible for the analysis of the security level of the graphical passwords that are Recognition-Based. Finally, a table comparing the limits of each method based on the security level is presented. 

Author(s):  
K Gangadhara Rao ◽  
Vijayakumari Rodda ◽  
B Basaveswara Rao

<p>Cloud computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platforms. However, a major barrier for cloud application is real and perceived lack of security. There are many security mechanisms exercised to utilize cloud services. Amongst them the prominent and primitive security mechanism is the Authentication System. Traditional text based passwords are susceptible to threats. Tough passwords are hard to recall and easily recalled passwords are simple and predictable. Graphical passwords are introduced as the better alternative. Two types of graphical passwords are there – recall based and recognition based. This research reviews several Recognition-Based Graphical Password methods and analyses their security based on the estimation criteria. Moreover, the research defines a metric called a 14-point scale that would make it possible for the qualitative analysis of the graphical passwords schemes. </p>


2018 ◽  
Vol 7 (4.10) ◽  
pp. 470
Author(s):  
P. L.P.Ramyasri ◽  
D. Malathi ◽  
J. D. Dorathi Jayaseeli ◽  
K. Senthilkumar

The text-based password has been the most common practice from ancient days till present. Text based pass-words are also known for various threats, and it is prone to attacks like guessing attacks, dictionary attacks, social engineering attacks, brute force attacks, etc. The next immediate concept following the text based password is the graphical password schemes to improve password security and usability. In present days graphical passwords are being implemented more commonly. This approach is different from the traditional alpha numeric as it deals with images. In this paper a survey study is done to analyse various techniques used for authentication and also some of the methods for graphical authentication techniques like Pass Matrix, Cued Clicked points(CPP), CAPTCHA, Image distortion with text association, Doodle scheme, Standard recognition-based scheme, Stegno pin authentication method. Based on the existing methods, the future research can be done in order to improve security for graphical authentication.  


2015 ◽  
Vol 2015 ◽  
pp. 1-10
Author(s):  
Javier Eduardo Diaz Zamboni ◽  
Daniela Osella ◽  
Enrique Valentín Paravani ◽  
Víctor Hugo Casco

The current report presents the development and application of a novel methodological approach for computer-based methods of processing and analysis of proliferative tissues labeled by ABC-peroxidase method using 3, 3′-diaminobenzidine (DAB) as chromogen. This semiautomatic method is proposed to replace the classical manual approach, widely accepted as gold standard. Our method is based on a visual analysis of the microscopy image features from which a computational model is built to generate synthetic images which are used to evaluate and validate the methods of image processing and analysis. The evaluation allows knowing whether the computational methods applied are affected by the change of the image characteristics. Validation allows determining the method’s reliability and analyzing the concordance between the proposed method and a gold standard one. Additional strongness of this new approach is that it may be a framework adaptable to other studies made on any kind of microscopy.


2010 ◽  
Vol 36 (3) ◽  
pp. 535-568 ◽  
Author(s):  
Deyi Xiong ◽  
Min Zhang ◽  
Aiti Aw ◽  
Haizhou Li

Linguistic knowledge plays an important role in phrase movement in statistical machine translation. To efficiently incorporate linguistic knowledge into phrase reordering, we propose a new approach: Linguistically Annotated Reordering (LAR). In LAR, we build hard hierarchical skeletons and inject soft linguistic knowledge from source parse trees to nodes of hard skeletons during translation. The experimental results on large-scale training data show that LAR is comparable to boundary word-based reordering (BWR) (Xiong, Liu, and Lin 2006), which is a very competitive lexicalized reordering approach. When combined with BWR, LAR provides complementary information for phrase reordering, which collectively improves the BLEU score significantly. To further understand the contribution of linguistic knowledge in LAR to phrase reordering, we introduce a syntax-based analysis method to automatically detect constituent movement in both reference and system translations, and summarize syntactic reordering patterns that are captured by reordering models. With the proposed analysis method, we conduct a comparative analysis that not only provides the insight into how linguistic knowledge affects phrase movement but also reveals new challenges in phrase reordering.


2021 ◽  
Vol 13 (21) ◽  
pp. 12174
Author(s):  
Yanan Li ◽  
Honggen Xiao ◽  
Naipeng Bu ◽  
Jianji Luo ◽  
Hui Xia ◽  
...  

The assessment of tourist destination images should not only be the arrangement of multiple influencing factors. This study explores the complex causal relationship for tourist destination images based on a configuration perspective to enhance the overall tourism image using the fuzzy-set qualitative comparative analysis method. The configurational paths for promoting tourism image can be categorized into two types and nine configurations in Shandong Province. Therefore, this study recommends augmenting the tourism image of the entire region with the logical thinking of “segmentation–integration” and “enhancing strengths–supplementing weakness” and finally realizing a sustainable tourist destination image.


Sign in / Sign up

Export Citation Format

Share Document