Graphical passwords: Behind the attainment of goals

被引:3
|
作者
Vaddeti, Ankitha [1 ]
Vidiyala, Deepthi [1 ]
Puritipati, Vineetha [1 ]
Ponnuru, Raveendra Babu [1 ]
Shin, Ji Sun [2 ]
Alavalapati, Goutham Reddy [1 ]
机构
[1] Natl Inst Technol Andhra Pradesh, Dept Comp Sci & Engn, Tadepalligudem, India
[2] Sejong Univ, Dept Comp & Informat Secur, Seoul, South Korea
来源
SECURITY AND PRIVACY | 2020年 / 3卷 / 06期
关键词
authentication; graphical password; performance; recognition-based; security;
D O I
10.1002/spy2.125
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Graphical authentication methods have emerged as an alternative to the conventional authentication methods over the past couple of decades. One of the most popular among types of graphical authentication methods is recognition-based authentication, where the user taps on pass images from one or more challenge sets of images in order to authenticate. The study of existing graphical authentication systems shows that several of them compromise their security while making the method simpler, which could lead to perpetration of numerous attacks like guessing, hidden camera, smudge, shoulder surfing, and many other. Furthermore, a few of them sacrifice performance while targeting security alone. Yet, this paper proposes a new method that resists the aforementioned attacks with good performance, while preserving the benefits of graphical passwords such as ease of use and increased memorability.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] TwoStep: An Authentication Method Combining Text and Graphical Passwords
    van Oorschot, P. C.
    Wan, Tao
    [J]. E-TECHNOLOGIES-INNOVATION IN AN OPEN WORLD, 2009, 26 : 233 - 239
  • [32] Is it Better to Choose Seen or Unseen Distracters for Graphical Passwords
    Ashraf, Abdul
    Poet, Ron
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN'19), 2019,
  • [33] Optimal Discretization for High-Entropy Graphical Passwords
    Bicakci, Kemal
    [J]. 23RD INTERNATIONAL SYMPOSIUM ON COMPUTER AND INFORMATION SCIENCES, 2008, : 48 - 53
  • [34] A Preliminary Study to Evaluate Graphical Passwords for Older Adults
    Jittibumrungrak, Paranya
    Hongwarittorrn, Nuttanont
    [J]. PROCEEDINGS OF CHIUXID 2019: 5TH INTERNATIONAL ACM IN-COOPERATION HCI AND UX CONFERENCE, 2019, : 88 - 95
  • [35] A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
    Saadi, Zena Mohammad
    Sadiq, Ahmed T.
    Akif, Omar Z.
    Farhan, Alaa K.
    [J]. ELECTRONICS, 2024, 13 (15)
  • [36] On predictive models and user-drawn graphical passwords
    Van Oorschot, P. C.
    Thorpe, Julie
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 10 (04)
  • [37] Click to Enter: Comparing Graphical and Textual Passwords for Children
    Cole, Jasper
    Walsh, Greg
    Pease, Zachary
    [J]. PROCEEDINGS OF THE 2017 ACM CONFERENCE ON INTERACTION DESIGN AND CHILDREN (IDC 2017), 2017, : 472 - 477
  • [38] A Human Factors Study of Graphical Passwords Using Biometrics
    Riggan, Benjamin S.
    Snyder, Wesley E.
    Wang, Xiaogang
    Feng, Jing
    [J]. PATTERN RECOGNITION, GCPR 2014, 2014, 8753 : 464 - 475
  • [39] Implementation of Graphical Passwords in Internet Banking for Enhanced Security
    Razvi, Salma Abid
    Neelima, S.
    Prathyusha, C.
    Yuvasree, G.
    Ganga, C.
    Kumar, K. Manoj
    [J]. 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 35 - 41
  • [40] On Automated Image Choice for Secure and Usable Graphical Passwords
    Dunphy, Paul
    Olivier, Patrick
    [J]. 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 99 - 108