Implementation Of A Graphical Based Password For Folder Cryptography

Implementation Of A Graphical Based Password For Folder Cryptography
Authors : Ms. Shilpa. L. Dhapade, Prof. Nilmani Verma
Publication Date: 01-07-2013


Author(s):  Ms. Shilpa. L. Dhapade, Prof. Nilmani Verma

Published in:   International Journal of Engineering Research & Technology

License:  This work is licensed under a Creative Commons Attribution 4.0 International License.

Website: www.ijert.org

Volume/Issue:   Vol.2 - Issue 7 (July - 2013)

e-ISSN:   2278-0181


Abstract? Now a day°«s most of the user are facing problem for providing the security to the folder, so that it will not be accesses by the unauthorised user. Sometimes our folder is going to be corrupted by the viruses which will corrupt our important files. Taking in action all these problems I have designed a model which will provide a best security to your folders and also save it from the viruses using graphical password authentication model. A Graphical Password based System are the systems in which images are used as a password instead of text password. Alphanumeric passwords are generally used for authentication process in most of the current systems. These passwords are usually short and memorable that°«s why they can be easily guessed by the attacker, but strong system-assigned password are difficult to remember In Graphical based system user click on images to authenticate themselves rather than type alphanumeric strings. Beginning around 1999, a multitude of graphical based password scheme which have been proposed as alternative to text based password scheme, motivated by the promise of improved password memorability and thus usability. This paper presents a detailed evaluation of the Persuasive Cued Click Points password scheme which provides high level of security and provides security to your folder with a platform independent environment. This paper also presents the SHA (secure hash algorithm) implementation used by the software for folder security used for folder security in java.


Number of Citations for this article:  Data not Available


Key Word(s):    


Number of Downloads:     1498

7   Paper(s) Found related to your topic:    

Call for Papers - May - 2017



                 Call for Thesis - 2017 

     Publish your Ph.D/Master's Thesis Online

              Publish Ph.D Master Thesis Online as Book