You are on page 1of 4

International Journal of Trend in Scientific Research and Development (IJTSRD)

Volume 6 Issue 3, March-April 2022 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470

A Survey on Smart Android Graphical Password


Diksha Kanwar1, Dr. Mir Aadil2
1
MCA Student, 2Assistant Professor,
1,2
School of CS & IT, Dept. of MCA, Jain (Deemed-to-be) University, Bangalore, Karnataka, India

ABSTRACT How to cite this paper: Diksha Kanwar |


Photo password is designed to take advantage of better memory and Dr. Mir Aadil "A Survey on Smart
protection against guessing attacks. Photo pass codes are best for Android Graphical Password" Published
small keyboard devices like Android and iPhones where entering text in International
Journal of Trend in
pass codes is difficult. In a project, the user can enter a template
Scientific Research
password and only the user knows what the entire template will look
and Development
like. Upon matching the pattern, the system opens security and opens (ijtsrd), ISSN: 2456-
the specified system. Each time a user logs in, the template password 6470, Volume-6 |
changes location randomly. Now you can create a source template by Issue-3, April 2022, IJTSRD49811
selecting the correct picture, and allow the system to check for pp.1725-1728, URL:
inspection and application. Otherwise, access to the user is not www.ijtsrd.com/papers/ijtsrd49811.pdf
provided.
Copyright © 2022 by author (s) and
KEYWORDS: password, security, authentication, fingerprint, International Journal of Trend in
identification, graphical passwords Scientific Research and Development
Journal. This is an
Open Access article
distributed under the
terms of the Creative Commons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)

I. INTRODUCTION:
Password Security Analysis is a prerequisite for The most popular iPhone password confirmation
machine and security. Passwords are selected with mechanism uses the PIN code that includes the least
people, and how to use a mnemonic or randomized 4Digit complexity (the last update may require 6
password is usually a way to select a password, so the digits). After being released, Android has provided a
password scheme is no longer used in the password wide range of unlocking, especially in Text Based
scheme. Thanks to the launch of smart phones and passwords, contacts, facial recognition and especially
capsules, the Free Up certification option used to this article, especially in this article. Unlocking
block and unlock the mobile gadget is very applicable Android Unlocked In most cases, it has been updated
to the picture security phrase. [1, 4] 1. Two major in a wide range of applications that are widely used
intelligent telephone structures, iOS and Android and are widely used. In the first case, research on
have a default strategy for unlocking each. Despite unlock style validation shows that the Android pattern
the establishment of the second and information that remains very common as a validation option. Various
contains fingerprints or reputation of the face, Past experiments also investigated how people choose
Code Based authentication is still one way to protect explicit sign-in patterns on Android devices. Other
the cell tool. "iPhone" authentication method The examples of if there is a device modification are
most famous method passes through the PIN that touch point changes, and the password counter is an
includes at least 4digit complexity (the last update indicator of popular influencer strategies and
may require 6Digit). After Android is created after demographic considerations in your collection. This
the text password, PIN signal, person, this newsletter document contains a detailed review and
is the most noticeable; we provide a wider range of classification of methods and techniques for
free authentication methods with this newsletter. compiling different classification documents. This
Android has proven to be effective in many gives the owners of these systems a clear
situations, and after it was widely applied and was understanding of how to protect their electronic
analyzed with the help of many programs in a variety devices from unwanted intrusions and attacks.
of contexts.

@ IJTSRD | Unique Paper ID – IJTSRD49811 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1725
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
II. LITERATURE REVIEW image during authentication from the list of
Graphical Password’s security tool that depends on selected images during registration.
talent. Many preferred thoughts and execution paths 2. Pure operation: Users must write or return code
have caused intensive investigations on the effects of
without tips. This method is effective and simple,
various variables to statistics on statistics based on but people cannot remember passwords.
certifications specific to text passwords. Unlike
moving, it will focus on a similar picture that is 3. How to manage: The user receives information or
firmly linked to a graphical password. It tends to play strategy throughout the entire process. Users can
four varieties as follows use information to remember passwords or to
enter or select the best password. This method is
III. SMART ANDROID AUTHENTICATION similar to a memory program, but uses a tag.
SECURITY
The authenticator is a device used for user 4. Hybrid Method: Inspection is performed in a
identification or automatic authentication. Evidence combination of two or more schemes. This
of control along with ownership allows people to be method removes problems related to other
authenticated to a computer device or program. programs such as spyware and surfing shoulders
Certificates transmit passwords in the simplest and is much more use
situation. The group that needs verification is the VI. UNLOCK CHOICES FOR ANDROID
NIST digital identity of the applicant, and the party SMARTPHONE AUTHENTICAT
that determines the authenticity of the manuscript is Password: Tutorials, Old Protection Passwords have
called a verifier. If a plaintiff uses a specific no powerful protection, but a series of functions can
certification process to effectively attest to one or be a rapidly serious security risk. The best protection
more validating validates, the validate can begin to for your mobile device is also a password (or his
identify the applicant.[7] cousin, password). However, if the password is
IV. ANDROID PATTERN PASSWORD insufficient: Each time you need to be able to access
The lock pattern unlocks only after drawing the the phone, it becomes difficult and difficult.[6]
correct pattern on three sides of the rectangle as PIN: Like passwords, PINs are a very secure way
shown in the picture. 1. Once users get used to this to see if you have 10,000+ options in a standard
natural self-locking, they will be able to log into their 4-digit option. A 16-digit PIN is definitely hard to
phone easily and using all 9 dots in the pattern will[3] remember, but Android computers can be
have around 400,000 passwords. Unfortunately, there protected with a 16-digit PIN, so the total number
are areas where pattern blocking doesn't work. After of valid codes is 10,000 trillion. However, there is
successfully regenerating the model, you will be able a downside to PINs that most people want to
to access the device. On figs. 1 shows the create very simple PINs that can be measured
corresponding stroke, starting from the top left very quickly.
corner.
Fingerprint scanner: For example, this method of
unlocking a portable device is quickly becoming
the preferred method. This method is not only
safe, but also very easy. However, even this
approach has its disadvantages. For example, a
fingerprint scanner is rarely placed in a very
convenient location on the phone. Also, using
Fig 1 3x3 accessible touch points Unlock from gloves is difficult to use this process.
top left touch point
Facial Recognition: In the current state, it is
V. METHODS FOR GRAPGHICAL recommended that you identify user identification
PASSWORS verification to access user identification by phone.
Partial features: Select images, thumbnails, or images However, in their present form, these systems are
in the image group of this collection. After not yet powerful enough to reliably protect
confirming, the client must remember the selected elements such as transactions and other financial
images, photos, and logos during the registration functions, but the situation is changing.
during the photo session. [1,2]
Smart Lock: Security features are available on
1. Your own approach: Users can select a miniature many phones today, depending on the
or image from the set of images displayed in the authentication format. Whenever a gadget is
GUI during this process. The user selects IT / its caught, body tracking is free, regardless of its

@ IJTSRD | Unique Paper ID – IJTSRD49811 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1726
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
owner. It is also possible to teach computers to graphical encryption system of children and
trust certain areas, computers, and people. adulthood and preference of children and adults and
Another option is to say "yes Google" to unlock preferences. Children remembered the password with
the user's phone with the Google Assistant. an image of a particular item. Two children and adults
However, these features are not good for user choose a photo password of the current system, but
safety and convenience. As previously reported, how they remembe
users of today's mobile devices may also opt for
biometrics such as fingerprint or facial
recognition. However, you will also need to select
a PIN or pattern in this area, so set up biometrics
in addition to the default settings. Additionally,
the user's choice of authentication secret remains
important, as criminals targeting authentication
systems can focus on knowledge-based attacks,
i.e. attacks that can be guessed or computed. The
image input pattern is not the only way to protect
the user. Various tests look at consumer
preferences for contacts and password. Fig 2. Categorization of authentication methods
From 2017 to 2021, a variety of reports on mobile for the graphical password.
access activities have been issued. According to 3-DimensionGraphical Password
these studies, users are more stable and resistant They have confirmed that they use a new
to the pin, but actually distortion is also accurate. authentication scheme based on the graphics key 3
In general, these results show that further research specifications to create a safe mobile device.[10]
in Android image cryptographic systems is With this authentication mechanism, the user can
required. Some users think some options are safe, interact with the Spantificary Artifathes in the World
but this approach is expected to protect the mobile Model, and the action is used to create a unique
phone from a user who is not authorized due to password. They have created basic research
user beliefs.[4,5] applications based on previous studies on
VII. PROTECTION ANDROID cryptographic specifications for building their
SMARTPHONE GRAPHICS password specifications. explains that is a multi-
PASSWORD destructive authentication system that can bind a
Recent studies have been proposed to analyze the certification method with a large authentication
movement of fingers in the drawings of the video in a method of the specification password to a single 3-
recent study to calculate the image password. You monotonous virtual world. The user browses others
need to know that, for example, in a public place, you and communicates. In a 3D world, a series of actions
should be able to make it within 2 meters of your and experiences creates a user's 3D password.
users. Users can navigate fingerprints that remain as 3Dimension Password is the most secure encryption
owners on the device screen, but users often do not tool you can use with any password combination.
work as a rule because they often need to handle Because it is a very strong authentication scheme, it is
many ambiguous or old methods. Maintain a stronger than other authentication methods. It also
transparent protection password, such as selecting an describes how attackers learn about the most likely
alternative to select an alternative to the hacker, and attacks. Shoulder attacks are still viable and
drag the "Show Template" option in the Android OS successful against 3D cryptography.
operating system settings. When the line is finished, Map-Based Graphical Password
this function is closed. The intermediate point is not Password mention, graphic password (GPS) shows
displayed on the device screen and the device lock that it could be an executable solution for an existing
lock is currently recommended. A visible password authentication system. GPS Map based (geographical
that prevents a hacker from listening to user passwords) allows you to select one or more locations
passwords has been installed. on the map for authentication designed to provide an
VIII. GRAPHICAL PASSWORD FOR extended Pass part hole. For example, if you use Past
CHILDREN Map, you can select two locations as keys, and
The image password was studied as a child solution CHEPASS selects a user to select a user. According
for user authentication. These systems have evaluated to some tests, one of the password formats is not
the usefulness of the three versions of the Pass Pass enough to reduce your kindness using two locations.
[8,9]They have found that the user has found that the

@ IJTSRD | Unique Paper ID – IJTSRD49811 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1727
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
user can choose from two PASTMAP locations and [3] RM. a. K. Thompson, Password security: A
that the user can select the same location due to time case history, Communications of the ACM.
limits. They developed CP Map, a point-based GP 1979;22:594-597.
map that allows users to first select a location on a
[4] RM. a. K. Thompson, Password security: A
world map and then click on a point or element on an case history, Communications of the ACM.
image associated with that location. To determine the
.2016
success of CP Map, a secondary usage analysis was
performed with up to 50 users. Our system has been [5] Bonneau J. The science of guessing:
shown to provide positive results for consumers in analyzing an anonymized corpus of 70
terms of security and usability. million passwords," presented at the IEEE
Symposium on Security and Privacy, San
IX. CONCLUSION Francisco, CA, USA; 2012
While the graphical password method can change the
way a typical shopper enters a password and secures [6] Saiful Azad, Musfiq Rahman, Noman Ranak
their password, it is not without its weakneses and MSA, Kamal Ruhee BMF, et al. VAP code:
limitations. One of the downsides of using a graphical A secure graphical password for smart
connection plot are the shoulder surfing bet. Graphic devices. Computers & Electrical
passwords can be externally distinguished without the Engineering. 2017.
need for a password field like alphanumeric [7] Ameen SY, Saud LJ. "Computing Nodes and
passwords, especially open spaces. An intruder can Links Apperances on Geodsics in Netoworks
see that the password is set more than once. They will Topologies Using Graph Theory," presented
break it quickly, which is a serious weakness. at presented at ECCCM 2011, January 30 –
Another disadvantage of graphical password plots is 31, 2011, University of Technology, Iraq;
that it does not offer any protection against 2011.
guesswork. In case the customer has just registered a
short and unsurprising password, such as an [8] Nandhini K, Sankar R. 3D password for
alphanumeric password, the probability of being more secure authentication in android
guessed by the customer increases to the next level phones. International Journal of Research in
Engineering, Science and Management.
X. REFERENCE 2019;.
[1] Kuo C, Romanosky S, Cranor LF. Human
selection of mnemonic phrase-based [9] KapilJuneja. An XML transformed method to
passwords, In Proceedings of the second improve effectiveness of graphical password
symposium on Usable privacy and security. authentication," Journal of King Saud
2019. University-Computer and Information
Sciences. 2020.
[2] Michelle SK, Mazurek L. Timothy Vidas,
Lujo Bauer, Nicolas Christin, Lorrie Faith [10] Khalid LF, Ameen SY. Secure Iot Integration
Cranor, Patrick Gage Kelley, Richard Shay, in Daily Lives: A Review," Journal of
and Blase Ur, "Measuring Password Information Technology and Informatics.
Guessability for an Entire University; 2018. 2021.

@ IJTSRD | Unique Paper ID – IJTSRD49811 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1728

You might also like