Authentication using Mixed-mode approach.

Authors

  • Urankar PN Department of Computer Department, K.J.Somaiya College of Engineering, Mumbai, India
  • Shete PJ Department of Computer Department, K.J.Somaiya College of Engineering, Mumbai, India

Keywords:

Text Password, Passfaces, Authentication, Authorized user, Phishing, Hybrid Password, BODMAS, Fisher Yates Randomizer Algorithm

Abstract

Text passwords have been widely used for user authentication, e.g., by almost all websites on the Internet. However, it is well-known that text passwords are insecure for a variety of reasons. For example, users tend to choose simple passwords which can be remembered easily. In favor of memorability, making them subject to dictionary attacks; and text passwords can be stolen by malicious software (e.g., keystroke loggers) when being entered from keyboards. Phishing is another serious threat to text passwords, by which, a user could be persuaded to visit a forged website and enter their passwords. The system aim is to grant access to a legal user, and to prevent the system from illegal or non-authorized person.

References

S.Anna Suganthi K.Karnavel “Virtual Password with Secret Function and Codebook(VFC) scheme for Protecting User’s Password as a Test for Security”Transactions on Engineering and Sciences Vol.2, Issue 11, November 2014.

Bin B. Zhu, Jeff Yan, Guanbo Bao,maowei Yang and Ning Xu “Captcha as Graphical Password- A New Security Primitive Based on Hard AI Probelms”IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,VOL.9, NO.6, JUNE 2014.

Shubham Bhardwaj, Varun Gandhi, Varsha Yadav, Lalit Poddar “New Era of authentication: 3-D Password”International Journal of Science, Engineering and Technology Research (IJSETR) Volume 1, Issue 5, November 2012.

Syed Shabih ul Hasan Naqvi ,Samiullah Afzal IEEE “Operation Code Authentication Preventing Shoulder Surfing Attacks”. 2010.

Wei Hu,Xiaoping Wu, Guoheng Wei ,” The Security Analysis of Graphical Passwords” International Conference on Communications and Intelligence Information Security,2010 .

Downloads

Published

2025-11-11

How to Cite

[1]
P. N. Urankar and P. J. Shete, “Authentication using Mixed-mode approach”., Int. J. Comp. Sci. Eng., vol. 4, no. 3, pp. 133–135, Nov. 2025.

Issue

Section

Technical Article