Volume 20 No 8 (2022)
 Download PDF
Comparison Of Graphical and Video Password Authentication System
N.Ramya , N.Neelima , P.Mahitha , B.Pranathi
Abstract
With the increase in the number of online services, there is a rapid growth in online information sharing and storing. This information can be very sensitive, hence requires strong security to overcome those security challenges. To ensure security of this online information, passwords were introduced. Text based password is a popular form of authentication method used since the ancient times. However, text-based passwords are prone to various attacks and security breaches. Strong text-based passwords could provide a certain amount of security. However, the fact that strong passwords are difficult to memorize often leads their users to write them down on papers or even save them in a computer file. Human actions such as choosing bad passwords and inputting passwords in an insecure way are regarded as the weakest link in the authentication chain. Graphical password is one of the alternative solutions to alphanumeric password. One of the major reasons behind this implementation is that, according to psychological studies, the human mind can more easily remember images than alphabets or digits. Even though graphical passwords have such advantages they are highly prone to shoulder surfing attacks. In order to provide much better safety systems, video authentication can be implemented.
Keywords
Graphical password, video password, security, frames, passwords, electronic health records
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.