Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks

LA Adebimpe, IO Ng, MYI Idris, M Okmi, CS Ku… - Applied Sciences, 2023 - mdpi.com
The rapid advancement of information technology (IT) has given rise to a new era of efficient
and fast communication and transactions. However, the increasing adoption of and reliance …

GPOD: an efficient and secure graphical password authentication system by fast object detection

P Ray, D Giri, W Meng, S Hore - Multimedia Tools and Applications, 2023 - Springer
Nowadays, the graphical password has gained significant recognition and has become a
subject of extensive investigation within the research community. The proliferation of Internet …

A Novel Non-Biometric Multi-Factor Authentication System Using Audios and Relationships

J Zermeno-Saldana… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Passwords are no longer a safe authentication, as they are susceptible to multiple
sophisticated attacks. This vulnerability underscores the importance of adopting multi-factor …

Reminisce: Blockchain Private Key Generation and Recovery Using Distinctive Pictures-Based Personal Memory

J Seo, D Ko, S Kim, V Sugumaran, S Park - Mathematics, 2022 - mdpi.com
As a future game-changer in various industries, cryptocurrency is attracting people's
attention. Cryptocurrency is issued on blockchain and managed through a blockchain wallet …

Natural language processing and stable diffusion model based graphical authentication using passphrase

N Dias, MSK, R SR - Intelligent Decision Technologies, 2024 - content.iospress.com
Graphical passwords or passphrases (GPs) are examined as reliable authentication system
over text-based passphrases. Several obtainable applications utilize GPs and image-based …

Image and video-based graphical password authentication

BNVVP Chimakurthi… - 2022 First International …, 2022 - ieeexplore.ieee.org
Personal authentication is the procedure which is used numeral times around world by way
of utilizing various methods and procedures. The best method for confirming an …

Graphical Password Authentication using Image Processing (GPAIP)

N Sivaranjani, P Sanjana… - … on Computing for …, 2024 - ieeexplore.ieee.org
In today's digital landscape, passwords are a fundamental part of our online experience,
required for accessing a wide range of services. With the increasing use of online platforms …

SelfiePass: A Shoulder Surfing Resistant Graphical Password Scheme

S Rajarajan, PLK Priyadarsini - 2021 International Conference …, 2021 - ieeexplore.ieee.org
User authentication is the process of ascertaining the identity of a person before permitting
to access the account in a system. The failure of authentication could result in breach of …

A Systematic Review of Graphical PasswordMethods Resistant to Shoulder-surfing Attacks

F Binbeshr, KC Siong, LY Por, M Imam, AA Al-Saggaf… - 2024 - researchsquare.com
Graphical passwords have emerged as an alternative to traditionalalphanumeric passwords,
offering potentially better memorability. However, they are often vulnerable to shoulder …

Usability Study on Textual and Graphical Passwords

AB Sakpere, TB Ologundudu - Proceedings of the Nigerian …, 2021 - nasjournal.org.ng
One of the most common methods used for authentication are passwords, in particular
textual passwords. However, maintaining multiple textual passwords across various …