More Related Content
Similar to graphical password authentication
Similar to graphical password authentication (20)
More from Akhil Kumar (20)
graphical password authentication
- 14. Using distorted images to prevent revealing of passwords Using images with random tracks of geometric graphical shapes