BOOK-CHAPTER

Secure Password Generation Using GIBP and Multi-Factor Authentication

Abstract

In today's digital world, it is increasingly important to generate secure passwords to protect against hacking and identity theft. The GIBP (Grassmann algorithm using Illusion pin with Brightness Password generation) approach creates secure passwords by using the Grassmann algorithm, which combines random characters and patterns to form unique passwords. The GIBP, with a strong password, adds an extra layer of security through multi-factor authentication. One popular multifactor authentication method is facial recognition technology, which involves scanning the user's face to confirm their identity. While combining GIBP with the Grassmann algorithm and facial recognition technology, users can generate highly secure passwords that are unique and difficult to crack. In addition, the use of multifactor authentication provides an extra layer of security, making it even more difficult for hackers to gain access to sensitive information. Overall, the GIBP with secure password generation and multifactor authentication is essential in today's digital world to protect against cyberattacks’ ever-increasing threats. The evaluation parameters include time taken, speed of operation for clustering, speed for face recognition, and time taken for training. The proposed method provides 99% accuracy and takes less time to capture images that are less than 1 ms. The proposed method is compared with three other methods and produces good results.

Keywords:
Password Authentication (law) One-time password S/KEY Password strength Password policy Cognitive password Hacker

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
3
Refs
0.91
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems
Face recognition and analysis
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Biometric Identification and Security
Physical Sciences →  Computer Science →  Signal Processing
© 2026 ScienceGate Book Chapters — All rights reserved.