Chrome Extension
WeChat Mini Program
Use on ChatGLM

Shoulder Surfing Attack Trusted Verification – A Survey

Valarmathi K,Hemalatha S,Perumal P, Puthilibai D, Abirami M

ECS Transactions(2022)

Cited 0|Views0
No score
Abstract
Individual performance such as select a mistaken code word or inflowing a code word in an unsure of yourself manner result in the easiest linkage in authentication. An invader is able to harm the hardware, software, or information by exploiting the weakest link. As a result, our goal is to give a elegant method for users to validate their bank accounts. In computer or IT security, authentication-based passwords are used. As an alternative of using alphanumeric as a code word, the user is able to choose to use an image as a password. The customer is capable of depicting the shoulder surfing attack using the mobile application. Passwords can be observed by attackers using spyware or shoulder surfing. To solve the problem, the Pass Matrix authentication system is proposed, which is based on graphical passwords and can withstand a shoulder surfing attack. Pass Matrix does not provide any suggestion or stature, still when conducting camera-based attacks, through a just the once suitable login display and navigation button cover the whole range of pass-image. As a result, the future system outperforms the competition in provisos of shoulder surfing resistance.
More
Translated text
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined