Sangeetha Govindan, J.R. Thresphine


Usable security has unique usability challenges because the need for security often means that standard human-computer-interaction approaches cannot be directly applied. An important usability goal for authentication systems is to support users in selecting better passwords. Users often create memorable passwords that are easy for attackers to guess, but strong system-assigned passwords are difficult for users to remember. So researchers of modern days have gone for alternative methods wherein graphical pictures are used as passwords. Graphical passwords essentially use images or representation of images as passwords. Human brain is good in remembering picture than textual character. There are various graphical password schemes or graphical password software in the market. However, very little research has been done to analyze graphical passwords that are still immature. There for, this work merges persuasive cued click points and password guessing resistant protocol. The major goal of this work is to reduce the guessing attacks as well as encouraging users to select more random, and difficult passwords to guess. Well known security threats like brute force attacks and dictionary attacks can be successfully abolished using this method.


Authentication; graphical passwords; usable security;


User Interfaces in C#: Windows Forms and Custom Controls by Matthew MacDonald.

Applied Microsoft® .NET Framework Programming (Pro-Developer) by Jeffrey Richter.

Practical .Net2 and C#2: Harness the Platform, the Language, and the Framework by Patrick Smacchia.

Data Communications and Networking, by Behrouz A Forouzan.

Computer Networking: A Top-Down Approach, by James F. Kurose.

Baeza-Yates and B.Ribeiro_Neto, Modern information retrivel.Addison Wesley, 1999.

R.M. Colomb, Information Spaces: The Architecture of Cyberspace. Springer, 2002.

A. Doan, J. Madhavan, P. Domingos, and A. Halevy, “Learning to Map between Ontologies on the Semantic Web,” Proc. 11th Int’l Conf. World Wide Web (WWW ’02), pp. 662-673, 2002.

Z. Cai, D.S. McNamara, M. Louwerse, X. Hu, M. Rowe, and A.C. Graesser, “NLS: A Non-Latent Similarity Algorithm,” Proc. 26th Ann. Meeting of the Cognitive Science Soc. (CogSci ’04), pp. 180-185, 2004.

L.M. Chan, Library of Congress Subject Headings: Principle and Application. Libraries Unlimited, 2005.

E. Frank and G.W. Paynter, “Predicting Library of Congress Classifications from Library of Congress Subject Headings,” J. Am Soc. Information Science and Technology, vol. 55, no. 3, pp. 214-227,2004.

R. Gligorov, W. ten Kate, Z. Aleksovski, and F. van Harmelen, “Using Google Distance to Weight Approximate Ontology Matches,” Proc. 16th Int’l Conf. World Wide Web (WWW ’07), pp. 767-776, 2007.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2021, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at