Volume -I , Issue -VI, August 2014


Author(s) :

Rashmi Wable , Suhas Raut


Graphical authentication technology till now is made for Desktop applications here in this paper have taken effort to make it for the android application. The two techniques cued click point and persuasive click point having their own advantages and disadvantages so have tried to make the third technique which will help to overcome from these disadvantages. Here is taken an effort to increase its complexity and to increase its security. Pictures are generally easier to be remembered or recognized than text, especially photos, which are even easier to be remembered than random pictures. This paper consist review of making the third combining technique of these two techniques together. This will surely make the system more safe and secure.


Android mobile system, Graphical password.

  1. 3.R. Dhamija and A. Perrig, "Deja Vu: A User Study Using Images for Authentication," in Proceedings of 9th USENIX Security Symposium, 2000.
  2. 5.I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A.D. Rubin, "The Design and Analysis of Graphical Passwords," in Proceedings of the 8th USENIX Security Symposium, 1999.
  3. 8.L. Sobrado and J.-C. Birget, "Graphical passwords," The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research, vol. 4, 2002
  4. 1.A.Adams and M.A.Sasse, "Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures," Communications of the ACM, vol. 42, pp. 41-46 1999
  5. 6.S. Man, D. Hong, and M. sLas Vegas, NV, 2003.
  6. 9.Sonia Chiasson, P.C. van Oorschot, and Robert Biddle, “Graphical Password Authentication Using Cued Click Points” ESORICS, LNCS 4734, pp.359-374, Springer-Verlag Berlin Heidelberg 2007.
  7. 2.S. Akula and V. Devisetty, "Image Based Registration and Authentication System," in Proceedings of Midwes Instruction and Computing Symposium, 2004.
  8. 4.Jansen, W., Gavrila, S., Korolev, V., Ayers, R., Swanstrom, R., “Picture Password: A Visual Login Technique for Mobile Devices”
  9. 10.Zhi Li, Qibin Sun, Yong Lian, and D. D. Giusto , “An association-based graphical password design resistant to shoulder surfing attack?, International Conference on Multimedia and Expo (ICME), IEEE.2005.
  10. 7.Manu Kumar, Tal Garfinkel, Dan Boneh and Terry Winograd, “Reducing Shoulder-surfing by using Gaze based Password Entry”, Symposium on Usable Privacy and Security (SOUPS), July 18-20, 2007, Pittsburgh, PA, USA.
How to Cite this Paper? [APA Style]
Rashmi Wable , Suhas Raut, (2014), ANDROID MOBILE APPLICATION USING NEWLY INVENTED GRAPHICAL PASSWORD TECHNIQUE, Industrial Science Journal, http://industrialscience.org/Article.aspx?aid=51&vid=6, (August, 2014)
Full Text in PDF

Full Article in PDF Format

Comment on this article...!!!

Previous Comments...
No previous comments.


Alert Me...!!!

When new article publish, article link will mail to your mail...

Enter Your Name :
Enter Your Email ID :

For Authors

For Readers