Securing Graphical Password Techniques from Shoulder Surfing and Camera Based Attacks
Esha Kumar, Senior Identity and Access Management Analyst, Schneider Electric, Bengaluru, India.
Manuscript received on 28 June 2022 | Revised Manuscript received on 12 July 2022 | Manuscript Accepted on 15 September 2022 | Manuscript published on 30 September 2022 | PP: 1-5 | Volume-11 Issue-3, September 2022 | Retrieval Number: 100.1/ijrte.B71640711222 | DOI: 10.35940/ijrte.B7164.0911322
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Authentication is a procedure that checks for validity and may be carried out in a variety of methods, including tokens, biometrics, and passwords with text and graphics. Usability is the primary driver of graphical passwords. However, shoulder surfing and camera-based attacks are the main potential disadvantage of this strategy. Shoulder surfing is a sort of social engineering method used in computer security to peek over the victim’s shoulder and steal information, including personal identification numbers (PINs), passwords, and other private information. This attack can be carried out either up close by peering straight over the victim’s shoulder or from a further distance, perhaps by utilizing a pair of binoculars or other comparable equipment. Crowded areas are when an assailant is most likely to shoulder surf the victim. These days, it’s fairly typical to enter passwords by looking. The fundamental process for gaze-based password entering is same as regular password entry, with the exception that the user stares at each desired character or triggered location in sequence rather of typing a key or touching the screen, much like when they are eye-typing. Therefore, in my project, I have made an effort to avoid these limitations by utilizing a powerful encryption technique like the Vernam Cipher.
Keywords: Vernam Cipher, Password Entry, Security, Shoulder Surfing
Scope of the Article: Security, Trust and Privacy