Open Access Open Access  Restricted Access Subscription or Fee Access

Cells in the Prison were Released Using Graphical Password

D. Ayswarya, R. Anitha

Abstract


In this paper it’s all about creating password for releasing cells in the prison using graphical password. By using textual passwords it can be easily cracked by the unknown people but in graphical passwords it can be in the image format and divided into grids to select our chosen images for password. It can be secured one for police to avoid escaping of thief who are all locked up in the cell. In this method the higher officer is the only person who knows the password for the respected cell to release the thief. The password can be entered through each and every cells in the prison were attached with one common system and assigns the cell no for respected cells and select the valid images to release the cell. Once they released using that password it cannot be used for the next time. Police officer wants to change the password for next release session it can be also known as one time password. Graphical passwords are secured one and it is a easy way to remember the password. By using this method it provides security to avoid escaping of thief.


Keywords


Password, Image Registration, Cells in Prison, Image Selection, Graphical Password, Authentication, Set of Images.

Full Text:

PDF

References


Macros Martinez-Diaz, Julian fierrez and Javier galbally, “graphical password-based user authentication with free-form doodles”

Shivani Agarwal, Adil zafar Ansari, M. Sarosh Umar, “Multimedia graphical grid based text password authentication”, ZHCET-Aligarh Muslim university Aligarh, India.

Abutalha Danish, Labhya Sharma, Harshith varshney, “alignmentation based graphical password authentication system”, ZHCET-Aligarh Muslim University Aligarh, India.

Siva Janakiraman, Karunya sri V S, Chathurya pulluri, “numerical password via graphical input- an authentication system on embedded platform”, SASTRA University, thanjavur

Zhen Yu, Ilesanmi Olade, Hai-Ning Liang, Charles Fleming, “Usable authentication mechanisms for mobile devices: An exploration of 3D graphical passwords”, Xi’an jiaotong-Liver pool university Suzhou, china.

R. Dhamija, and A. perrig, “Déjà vu: A user study using images for authentication”. In 9th USENIX security symposium

W. jansen, “authenticating mobile device user through image selection”, in data security.

Authentication using graphical passwords. Basic results susan wiedendeck jim waters college of IST Drexel university Philadelphia, pa.19104 USA

Xiyang Liu, Jinhua Qiu, Licheng Ma, Haichang Gao, and Zhongjie Ren, “A Novel Cued-recall Graphical Password Scheme”, Xidian University, P.R.China

S.Man, D. Hong, and M.Mathews, "A shoulde rsurfing resistant graphical password scheme" in Proceedings of International conference on security and management. LasVergas, NV, 2003 Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang Liu Uwe Aickelin, ―A New Graphical Password Scheme Resistant to Shoulder-Surfing.

HK Sarohi1, and FU Khan, “Graphical Password Authentication Schemes: Current Status and Key Issues,” Int. J. Eng. Innovative Technol., vol. 10, March 2013.

J. Thorpe and P. C. v. Oorschot, "Towards Secure Design Choices for Implementing Graphical Passwords," in Proceedings of the 20th Annual Computer Security Applications Conference. Tucson, Arizona, 2004.

N. S. Govindarajulu and S. Madhvanath, “Password management using doodles,” in Proc. 9th Intl. Conf. Multimodal Interfaces, 2007, pp. 236– 239.

W. Zada Khan, M. Y. Aalsalem, and Y. Xiang, “A graphical password based system for small mobile devices,” Int. J. Comput. Sci. Issues, vol. 8, no. 5, pp. 145–154, 2011.

I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, "The Design and Analysis of Graphical Passwords," in Proceedings of the 8th USENIX Security Symposium, 1999.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.