{"title":"Image and Video-based Graphical Password Authentication","authors":"B. N. V. V. P. Chimakurthi, K. Prakash","doi":"10.1109/ICEEICT53079.2022.9768604","DOIUrl":null,"url":null,"abstract":"Personal authentication is the procedure which is used numeral times around world by way of utilizing various methods and procedures. The best method for confirming an alphanumerical secret phrase is used for many years. Additionally, alphabet and passwords have enormous security issues like people forgetting key combinations due to difficult key combination selection. Additionally, when choosing a simple key aggregate, facilitates cybercriminals to decrypt their passwords more without problems. Regular passwords are susceptible to several sorts of attacks, for example, dictionary attacks, aggressive attacks, and malware. To offer a more secure and relaxed authentication method, a photographic authentication is presented on this page. Here we provide user protection and authentication. This paper includes parts, picture processing the usage of the selected click on vicinity and video processing the usage of click on durations, wherein your mixture of each will generate a password for the person to sign in. To log in, both combos have to be same. The user is allowed to pick his or her photograph and video alternatives and is saved on a notably non-public web site so that it isn't always accessible to different clients. The secret key produced for both previews and video is stowed away from the two clients and developers. This method is to be needed to save you unapproved get admission to large and selective information and to ensure it.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEEICT53079.2022.9768604","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Personal authentication is the procedure which is used numeral times around world by way of utilizing various methods and procedures. The best method for confirming an alphanumerical secret phrase is used for many years. Additionally, alphabet and passwords have enormous security issues like people forgetting key combinations due to difficult key combination selection. Additionally, when choosing a simple key aggregate, facilitates cybercriminals to decrypt their passwords more without problems. Regular passwords are susceptible to several sorts of attacks, for example, dictionary attacks, aggressive attacks, and malware. To offer a more secure and relaxed authentication method, a photographic authentication is presented on this page. Here we provide user protection and authentication. This paper includes parts, picture processing the usage of the selected click on vicinity and video processing the usage of click on durations, wherein your mixture of each will generate a password for the person to sign in. To log in, both combos have to be same. The user is allowed to pick his or her photograph and video alternatives and is saved on a notably non-public web site so that it isn't always accessible to different clients. The secret key produced for both previews and video is stowed away from the two clients and developers. This method is to be needed to save you unapproved get admission to large and selective information and to ensure it.