A visual password scheme on text was proposed by Nikam. In this way, the starting stage has eight different colours which are shown to the users. A colour has to be selected as the security mechanism. The login phase has eight parts with an arc which is uniquely coloured and another sixty-four letters which are differentiated into sectors and are not sequentially shown to the person. The person is given a choice to select the area in which there is a letter of the password and can then drag it to the sector in which the arc was selected during the authorisation.
A new technique was proposed by Lashkari in which the security process consists of the photo selection with distinct size of the grids. If in the authorisation phase the person selects the pictures are to be chosen from the four by four matrix and then at the time of the login, the key is to be selected from the grids which can be of another sides i.e three by three “,five by five , six by six.The dimension of the matrix which are during the key in and registration phase are not the same.
A new security method was proposed which was image based.The registration phase comprises selecting photos which are desirable by the person and then can choose different points by clicking picture. The person accessing the system has to memorise the points that have been clicked, their count and progression and the interval between the simultaneous clicked points.At the time of login, the points clicked during the start have to be pointed again.
A draw based technique was proposed by Rane in which, the pictures are shown to the user during the login.Many photos have to be selected by the user to compose a fresh password.Following this, the user has to choose an image from the selected pictures to create the private key . Then , the user has to draw a secret by pointing on one image from the chosen images.Now, when the user has to login , he draws the secret the way it was done during the time of registration . It is not necessary to have the sequence while clicking.
An authentication technique came up which consisted of decoy image parts. The starting phase in the process consists of the user send an image from his collection and has to choose the zone for the complexity. The second phase i.e. login provides the user parts of the pictures which were uploaded previously and the complexity which was chosen during the registration .The sub images are automatically added.Out of the images, the user has to choose the parts which belong to the original picture.
A new method came up comprising the pictures plus audio ordering.The starting phase is basic i.e. providing the personal information.Next, the person has to select the pictures already defined in an order . At the end, the user has to create a sound key similar to the images.Now , while logging into the system, the pixels from the selected photos have to be selected and the audio key has also to be verified.This is a very secure method and enhances the security but it is not efficient as it consumes a lot of time, both during the login as well as the registration.
Now, cryptography was also linked to the authentication. The process consisted of Cryptographic Hashing.The first phase i.e. registration allows the user to add the personal info. Ciphering is done on the key and saved to the database. When the user has to log in again , he has to enter the accurate details which were entered previously. He is provided a maximum of two chances to enter the correct details. If the person fails, he is shown a serval pictures and has to choose the one which was chosen earlier.This chance is allowed only once. If failed to choose the correct picture, the person is blocked . The only option after this is resetting the password.
A method was introduced which had alternated click points. The person has to choose point inside the grids on the pictures chosen. To add more privacy, audio during the click is also mixed along with the password. At the time of entering in, both of these are checked and only then the access is allowed.
A new way comprising recognition using both the texts and pictures was introduced.After the user completes the authorisation by entering the details and setting the password , a rounded picture is shown.The photo is divided into eight parts and each sector has different numbering or label.This is to be remembered and selected when the person has to log in again into the system.
A new way was introduced by Ansari Ahmad in which the person has to select the images and store it on the server. Integrity protection in this case is done using the BOGUS-POINTS in the fields where the user enter the key or the password.The person has to choose a number of points on the images