Graphical passwords: Behind the attainment of goals

被引:3
|
作者
Vaddeti, Ankitha [1 ]
Vidiyala, Deepthi [1 ]
Puritipati, Vineetha [1 ]
Ponnuru, Raveendra Babu [1 ]
Shin, Ji Sun [2 ]
Alavalapati, Goutham Reddy [1 ]
机构
[1] Natl Inst Technol Andhra Pradesh, Dept Comp Sci & Engn, Tadepalligudem, India
[2] Sejong Univ, Dept Comp & Informat Secur, Seoul, South Korea
来源
SECURITY AND PRIVACY | 2020年 / 3卷 / 06期
关键词
authentication; graphical password; performance; recognition-based; security;
D O I
10.1002/spy2.125
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Graphical authentication methods have emerged as an alternative to the conventional authentication methods over the past couple of decades. One of the most popular among types of graphical authentication methods is recognition-based authentication, where the user taps on pass images from one or more challenge sets of images in order to authenticate. The study of existing graphical authentication systems shows that several of them compromise their security while making the method simpler, which could lead to perpetration of numerous attacks like guessing, hidden camera, smudge, shoulder surfing, and many other. Furthermore, a few of them sacrifice performance while targeting security alone. Yet, this paper proposes a new method that resists the aforementioned attacks with good performance, while preserving the benefits of graphical passwords such as ease of use and increased memorability.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] Guessing Click-Based Graphical Passwords by Eye Tracking
    LeBlanc, Daniel
    Forget, Alain
    Biddle, Robert
    [J]. PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, : 197 - 204
  • [42] Universal Multi-Factor Authentication Using Graphical Passwords
    Sabzevar, Alireza Pirayesh
    Stavrou, Angelos
    [J]. SITIS 2008: 4TH INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGY AND INTERNET BASED SYSTEMS, PROCEEDINGS, 2008, : 625 - 632
  • [43] Graphical passwords using images with random tracks of geometric shapes
    Lin, Phen-Lan
    Weng, Li-Tung
    Huang, Po-Whei
    [J]. CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 3, PROCEEDINGS, 2008, : 27 - +
  • [44] GridMap: Enhanced Security in Cued-Recall Graphical Passwords
    Van Balen, Nicolas
    Wang, Haining
    [J]. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 75 - 94
  • [45] On Purely Automated Attacks and Click-Based Graphical Passwords
    Salehi-Abari, Amirali
    Thorpe, Julie
    van Oorschot, P. C.
    [J]. 24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 111 - 120
  • [46] Memorability of Cued-Recall Graphical Passwords with Saliency Masks
    Alt, Florian
    Mikusz, Mateusz
    Schneegass, Stefan
    Bulling, Andreas
    [J]. 15TH INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS MULTIMEDIA (MUM 2016), 2016, : 191 - 200
  • [47] Purely Automated Attacks on PassPoints-Style Graphical Passwords
    van Oorschot, Paul C.
    Salehi-Abari, Amirali
    Thorpe, Julie
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (03) : 393 - 405
  • [48] A remote user authentication scheme using strong graphical passwords
    Ku, WC
    Tsaur, MJ
    [J]. LCN 2005: 30th Conference on Local Computer Networks, Proceedings, 2005, : 351 - 355
  • [49] A Comprehensive Study of Frequency, Interference, and Training of Multiple Graphical Passwords
    Everitt, Katherine M.
    Bragin, Tanya
    Fogarty, James
    Kohno, Tadayoshi
    [J]. CHI2009: PROCEEDINGS OF THE 27TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, 2009, : 889 - 898
  • [50] Do Background Images Improve "Draw a Secret" Graphical Passwords?
    Dunphy, Paul
    Yan, Jeff
    [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 36 - 47