Affiliation:
1. Department of Computer Science, Kebbi State University of Science and Technology Aliero, Nigeria
Abstract
System security is very important, especially in the age that we live in. One of the ways to secure data is by creating a password that makes it difficult for unauthorized user to gain access to the system. However, what makes it difficult for the system to be attacked is directly dependent on approach used to create it, and how secured it is. Text based approach is the oldest authentication approach. It requires that the user supplies textual password in order to gain access to the system. However, this approach has shown a significant drawback and several vulnerabilities, one of which is the difficulty in recalling or remembering textual passwords. Several other attacks that textual passwords are vulnerable to include brute force attacks, shoulder spying, dictionary attacks etc. The introduction of graphical schemes made things a lot better. Graphical passwords make use of images. However, most graphical schemes are vulnerable to shoulder surfing attacks. In this research work, we developed two systems; A position-based multi-layer graphical user authentication system and an Image-based multi-layer graphical user authentication system. The reason behind this research work is to compare the two systems, and evaluate them based on three major performance metrics: (1) Security, (2) Reliability (3) Individual preference.
Publisher
Oriental Scientific Publishing Company
Subject
General Earth and Planetary Sciences,General Environmental Science
Reference13 articles.
1. 1. Vimal Gaur, A. S. (2017). Authentication using a Combination of Color Scheme and Musical Notes. International Journal of Engineering Research & Technology (IJERT), 1-5.
2. 2. Harinandan Tunga, D. S. (2015). Graphical User Authentication Techniques for Security: A Comparative Study . International Journal of Engineering and Advanced Technology (IJEAT), 1-7.
3. 3. Jiya Gloria Kaka, I. O. (2021). Recognition Based Graphical Password Algorithms: A Survey. 1-10.
4. 4. Christina Katsini, Christos Fidas, Marios Belk, George Samaras, Nikolaos Avouris. (2019). A Human Cognitive Perspective of Users’ Password Choices in Recognition-based Graphical Authentication. International Journal of Human-Computer Interaction, 1-24.
5. 5. Adama Victor Ndako, O. I. (2021). Pure Recall-Based Graphical User Authentication Schemes: Perspectives from a Closer look. African Human-Computer Interaction Conference, 1-5.