ijaser
IJASER publishes high-quality, original research papers, brief reports, and critical reviews in all theoretical, technological, and interdisciplinary studies that make up the fields of advanced science and engineering and its applications.
Image based password schemes are constructed to authenticate users. Graphical passwords are composed withimages and sketches with human memory for visual information. Improved password memorability and strength againstguessing attacks are the key benefits of graphical password schemes. Graphical passwords are classified into three maincategories. They are recall, recognition and cued-recall methods. Recall based graphical password systems are draw metricsystems. Recognition based systems, also known as cogno metric systems or search metric systems. Cued recall systems
typically require that users remember and target specific locations within an image.
Graphical passwords and Captcha schemes are integrated to perform the user authentication with improved securitymechanism. Captcha as graphical passwords (CaRP) is a graphical password scheme used for user authentication. Online
guessing attacks, relay attacks and shoulder surfing attacks are handled in CaRP. CaRP is click-based graphical passwords.where a sequence of clicks on an image is used to derive a password. Dynamic captcha challenge image is used for eachlogin attempt in CaRP. Text Captcha and image-recognition Captcha are used in CaRP scheme. Text CaRP schemeconstructs the password by clicking the right character sequence on CaRP images. CaRP schemes can be classified into twocategories recognition based CaRP and recognition-recall based CaRP. Recognition-based CaRP seems to have access to an
infinite number of different visual objects. Recognition-recall based CaRP requires recognizing an image and using therecognized objects as cues to enter a password. Recognition-recall combines the tasks of both recognition and cued-recall.
Password information is transferred and verified using hash codes. Secure channels between clients and the authenticationserver through Transport Layer Security (TLS).
The system is improved with distribution analysis and transmission security features. Pattern based attacks arehandled with Color and Spatial patterns. Pixel colors in click points are considered in the color pattern analysis model. Pixellocation patterns are considered in the spatial pattern analysis model.