Shoulder Surfing Resistant Graphical Authentication Scheme for Web Based Applications
Shoulder Surfing Resistant Graphical Authentication Scheme for Web Based Applications
Article PDF

Keywords

authentication
text-based authentication
graphical based authentication
security
shoulder surfing

How to Cite

Seun Ebiesuwa, AKINSANYA, Adebola, AKINSANYA, & Adebola. (2018). Shoulder Surfing Resistant Graphical Authentication Scheme for Web Based Applications. Global Journal of Computer Science and Technology, 17(C3), 15–23. Retrieved from https://gjcst.com/index.php/gjcst/article/view/691

Abstract

Since the design and development of the first graphical authentication pioneered by Blonder in 1996 numerous research has been conducted on this area to be used in different scenarios especially on the Internet One of the major motivators is the picture superiority which as studies have shown states that images pictures provide higher memorability as opposed to Text based authentication However graphical authentication is still faced with some challenges In this paper a shoulder surfing resistant graphical authentication scheme is proposed to tackle a major issue related to the graphical authentication schemes developed The proposed scheme provides a high level of resistance to shoulder surfing attacks mitigating the need to upload pictures and aids in finding chosen objects in the scheme However the schemes has some vulnerabilities which implies that there may not be a perfect graphical authentication scheme each scheme has its merits and demerits making it a suitable candidate for different environment and or event depending on its architecture
Article PDF
Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright (c) 2017 Authors and Global Journals Private Limited