Get the complete project »
- The Complete Research Material is averagely 90 pages long and it is in Ms Word Format, it has 1-5 Chapters.
- Major Attributes are Abstract, All Chapters, Figures, Appendix, References.
- Study Level: BTech, BSc, BEng, BA, HND, ND or NCE.
- Full Access Fee: ₦7,000
Authentication is unavoidable in any environment where sensitive information is utilized. In accessing resources via the Internet, the most common means of identification required for authentication is the user’s identity and a secret passphrase known as a password. Studies have shown that the birth of graphical password which uses images/pictures/objects was out of the trivial password generated by users because of the inability to remember complex passwords when using text-based password. Graphical password is stronger and increases memorability. However, graphical-based password is faced with several challenges including, a high storage capacity for all the images/pictures/objects, no assistance for users in browsing through an array of images/pictures/objects and vulnerability to shoulder surfing attacks.
The graphical authentication scheme was evaluated using Magic Triangle Evaluation model. The results showed that the password space and entropy were 2.61*104 and 14.39 respectively. The scheme showed a level of resistance of about 85% towards shoulder surfing attacks.
The study concluded that the graphical authentication scheme has a high level of resistance against shoulder surfing attacks but a low password space and entropy making it vulnerable to brute force attacks. It is therefore recommended to be used in an environment where shoulder surfing is inevitable and additional security mechanism should be added to reduce its vulnerability to brute force attacks. It can also be used as a Completely Automated Turing Test to tell Computers and Humans Apart (CAPTCHA).
Keywords: Graphical authentication, Shoulder surfing attack, Brute force attack, Web-based
application, Password space and Entropy.
You either get what you want or your money back. T&C Apply
You can find more project topics easily, just search
SIMILAR COMPUTER SCIENCE FINAL YEAR PROJECT RESEARCH TOPICS
» CHAPTER ONE INTRODUCTION It should come as no surprise, then, that technology continue our limited, though uniquely human capabilities. Until recently...Continue Reading »
» ABSTRACT In Nigeria today, it is a well known fact that mathematics is one of the subject that students find difficult to understand and pass for one ...Continue Reading »
» CHAPTER ONE GENERAL DESCRIPTION OF THE STUDY 1.0 INTRODUCTION The cheque clearing system is the means whereby bank exchange cheque drawn each others t...Continue Reading »
» ABSTRACT The magical impact of computer has made enormous contribution to all aspect of the society people can now do things easily unlike in the past...Continue Reading »
» CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF STUDY Pension is generally a way of catering for the need of the retiree. It is a form of income provided t...Continue Reading »
» CHAPTER ONEINTRODUCTION1.1 IntroductionCloud Computing is a new paradigm of computing which has evolved in recent times, it’s a platform where hardw...Continue Reading »
7. DESIGN AND IMPLEMENTATION OF WEB-BASED DRUG INVENTORY MANAGEMENT SYSTEM (A CASE STUDY OF FEDERAL MEDICAL CENTER BIDA)» CHAPTER ONE INTRODUCTION 1.0 INTRODUCTION This chapter discusses the background to the study, statement of the problem, objectives of study, significa...Continue Reading »
» CHAPTER ONE INTRODUCTION 1.1 Overview The highly technological era that we live in has made it possible for companies to gather enormous quantities of...Continue Reading »
» CHAPTER ONE1.0 INTRODUCTIONMaterial Procurement can be defined as the purchase of goods or services at a total cost of the optimum possible in the cor...Continue Reading »
» ABSTRACT This study was carried out to verify all the manual processes involved in generating student’s transcript and to seek for a way of automati...Continue Reading »