Graphical passwords: A survey

被引:0
|
作者
Suo, XY [1 ]
Zhu, Y [1 ]
Owen, GS [1 ]
机构
[1] Georgia State Univ, Dept Comp Sci, Atlanta, GA 30303 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend to pick passwords that can be easily guessed On the other hand, if a password is hard to guess, then it is often hard to remember. To address this problem, some researchers have developed authentication methods that use pictures as passwords. In this paper, we conduct a comprehensive survey of the existing graphical password techniques. We classify these techniques into two categories: recognition-based and recall-based approaches. We discuss the strengths and limitations of each method and point out the future research directions in this area. We also try to answer two important questions. "Are graphical passwords as secure as text-based passwords?", "What are the major design and implementation issues for graphical passwords?" This survey will be useful for information security researchers and practitioners who are interested in finding an alternative to text-based authentication methods.
引用
收藏
页码:419 / 428
页数:10
相关论文
共 50 条
  • [41] Universal Multi-Factor Authentication Using Graphical Passwords
    Sabzevar, Alireza Pirayesh
    Stavrou, Angelos
    [J]. SITIS 2008: 4TH INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGY AND INTERNET BASED SYSTEMS, PROCEEDINGS, 2008, : 625 - 632
  • [42] Graphical passwords using images with random tracks of geometric shapes
    Lin, Phen-Lan
    Weng, Li-Tung
    Huang, Po-Whei
    [J]. CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 3, PROCEEDINGS, 2008, : 27 - +
  • [43] GridMap: Enhanced Security in Cued-Recall Graphical Passwords
    Van Balen, Nicolas
    Wang, Haining
    [J]. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 75 - 94
  • [44] On Purely Automated Attacks and Click-Based Graphical Passwords
    Salehi-Abari, Amirali
    Thorpe, Julie
    van Oorschot, P. C.
    [J]. 24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 111 - 120
  • [45] Memorability of Cued-Recall Graphical Passwords with Saliency Masks
    Alt, Florian
    Mikusz, Mateusz
    Schneegass, Stefan
    Bulling, Andreas
    [J]. 15TH INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS MULTIMEDIA (MUM 2016), 2016, : 191 - 200
  • [46] Purely Automated Attacks on PassPoints-Style Graphical Passwords
    van Oorschot, Paul C.
    Salehi-Abari, Amirali
    Thorpe, Julie
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (03) : 393 - 405
  • [47] A remote user authentication scheme using strong graphical passwords
    Ku, WC
    Tsaur, MJ
    [J]. LCN 2005: 30th Conference on Local Computer Networks, Proceedings, 2005, : 351 - 355
  • [48] A Comprehensive Study of Frequency, Interference, and Training of Multiple Graphical Passwords
    Everitt, Katherine M.
    Bragin, Tanya
    Fogarty, James
    Kohno, Tadayoshi
    [J]. CHI2009: PROCEEDINGS OF THE 27TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, 2009, : 889 - 898
  • [49] Do Background Images Improve "Draw a Secret" Graphical Passwords?
    Dunphy, Paul
    Yan, Jeff
    [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 36 - 47
  • [50] Evaluating Voxel-Based Graphical Passwords for Virtual Reality
    Rawat, Prashant
    Turkmen, Rumeysa
    Nwagu, Chukwuemeka
    Sunday, Kissinger
    Machuca, Mayra Donaji Barrera
    [J]. 2024 IEEE CONFERENCE ON VIRTUAL REALITY AND 3D USER INTERFACES ABSTRACTS AND WORKSHOPS, VRW 2024, 2024, : 12 - 17