Open Access Open Access  Restricted Access Subscription or Fee Access

Tract & Grid Based Image Authentication

A.R. Sajeev Ambi, N. Suresh Singh, Shibin J Raj, M. Sreelal


People often choose weak passwords or use the same password for multiple accounts. Such practices can threaten security for not only the individual, but also for the entire website, service or business application. If a hacker is able to access just one user account through weak or stolen credentials, it can quickly escalate to a more widespread security breach. For avoiding this we are developing an easy and intuitive second layer of authentication using sector of images. First level is authenticating with alphanumeric and the second level is authenticating with several facts of an image.


Tract Forming, Category Authentication

Full Text:



Lee Jackson,Analysis of Image-Based Authentication and its Role in Security Systems of the Future, Lee Jackson 05013035 BEng (Honours) Internet Computing.

Srinath Akula, Veerabhadram Devisetty, Image Based Registration and Authentication System.

Tetsuji TAKADA1 and Hideki KOIKE2, Awase-E: Image-based Authentication for Mobile Phones using User‟s Favorite Images.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.