Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks

LA Adebimpe, IO Ng, MYI Idris, M Okmi, CS Ku… - Applied Sciences, 2023 - mdpi.com
The rapid advancement of information technology (IT) has given rise to a new era of efficient
and fast communication and transactions. However, the increasing adoption of and reliance …

[HTML][HTML] A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords

ZM Saadi, AT Sadiq, OZ Akif, AK Farhan - Electronics, 2024 - mdpi.com
As technology advances and develops, the need for strong and simple authentication
mechanisms that can help protect data intensifies. The contemporary approach to giving …

Prevention of shoulder-surfing attacks using shifting condition using digraph substitution rules

A Islam, F Othman, N Sakib, HMH Babu - arXiv preprint arXiv:2305.06549, 2023 - arxiv.org
Graphical passwords are implemented as an alternative scheme to replace alphanumeric
passwords to help users to memorize their password. However, most of the graphical …

A taxonomy of multimedia-based graphical user authentication for green Internet of Things

KA Awan, I Ud Din, A Almogren, N Kumar… - ACM Transactions on …, 2021 - dl.acm.org
Authentication receives enormous consideration from the research community and is proven
to be an interesting field in today's era. User authentication is the major concern because …

Enhancing graphical password authentication system with deep learning-based arabic digit recognition

AF Rasheed, M Zarkoosh, FR Elia - International Journal of Information …, 2024 - Springer
The purpose of this research paper is to introduce a new graphical password system that
combines the strengths of traditional passwords, such as flexibility, with the benefits of …

LocPass: A graphical password method to prevent shoulder-surfing

LY Por, LA Adebimpe, MYI Idris, CS Khaw, CS Ku - Symmetry, 2019 - mdpi.com
Graphical passwords are a method of authentication in computer security. Computer security
is one of the disciplines of computer science. Shoulder-surfing attacks are a well-known …

Preventing shoulder-surfing attacks using digraph substitution rules and pass-image output feedback

LY Por, CS Ku, TF Ang - Symmetry, 2019 - mdpi.com
In this paper, we focus on methods to prevent shoulder-surfing attacks. We initially adopted
digraph substitution rules from PlayFair cipher as our proposed method. PlayFair cipher is a …

Recognition-based graphical password algorithms: A survey

JG Kaka, OO Ishaq, JO Ojeniyi - 2020 IEEE 2nd International …, 2021 - ieeexplore.ieee.org
User Authentication is an important aspect of information security. Alphanumeric passwords
are the most common and widely adopted means of user authentication. Nevertheless, there …

Secure graphical password based on cued click points using fuzzy logic

F Ghiyamipour - Security and Privacy, 2021 - Wiley Online Library
Nowadays authentication technology is the most important means to ensure security.
Alphanumeric username and password procedure is the most common authentication …

Graphical User Authentication Algorithms Based on Recognition

ZM Saadi, AT Sadiq, OZ Akif - ARO-THE SCIENTIFIC …, 2024 - aro.koyauniversity.org
In cyber security, the most crucial subject in information security is user authentication.
Robust text-based password methods may offer a certain level of protection. Strong …