Reimagining Authentication: A User-Centric Two-Factor Authentication with Personalized Image Verification

E Djeki, J Dégila, MH Alhassan - 2024 ASU International …, 2024 - ieeexplore.ieee.org
As digital ecosystems burgeon, the imperative to fortify user authentication methods
intensifies. This paper introduces a novel two-factor authentication system designed to …

A Systematic Review of Graphical PasswordMethods Resistant to Shoulder-surfing Attacks

F Binbeshr, KC Siong, LY Por, M Imam, AA Al-Saggaf… - 2024 - researchsquare.com
Graphical passwords have emerged as an alternative to traditionalalphanumeric passwords,
offering potentially better memorability. However, they are often vulnerable to shoulder …

Usability Study on Textual and Graphical Passwords

AB Sakpere, TB Ologundudu - Proceedings of the Nigerian …, 2021 - nasjournal.org.ng
One of the most common methods used for authentication are passwords, in particular
textual passwords. However, maintaining multiple textual passwords across various …

The Art of Deception: Novel Graphical User Authentication Scheme Using Illusion Images

A Nazir, MS Umar - 2023 IEEE International Conference on …, 2023 - ieeexplore.ieee.org
User authentication is a crucial component of information security and can be accomplished
through various ways. Strong text-based password authentication techniques have been …