A Hybrid Graphical User Authentication Scheme

被引:0
|
作者
Saeed, Swaleha [1 ]
Umar, M. Sarosh [1 ]
机构
[1] Aligarh Muslim Univ, Dept Comp Engn, Aligarh 202002, India
关键词
Authentication; Cognometric Schemes; Dynamic Graphics; Shoulder Surfing Attacks;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Graphical password has been introduced as an alternative to text based approaches motivated by the fact that humans can remember images better than text. In this paper we have proposed a graphical user authentication scheme that is a hybrid technique, combination of recognition based scheme and dynamic graphics. The scheme basically focuses on resistivity to shoulder surfing attacks without sacrificing usability, while at the same time improving strength against guessing attacks. The proposed work exploits novel concept of dynamic graphics in which colored objects are associated with the individual password portfolio images and on the screen the color of these objects changes rapidly. The user is required to click at the instant when the desired color associated with the portfolio image is displayed on the screen. User study demonstrated that the scheme is robust, secure and offers high usability and memorability. Hence, can be easily adopted for authentication in public places such as ATMs, access control, cyber cafes, mobile phones etc. without requiring any hardware changes in the existing set-up.
引用
收藏
页码:411 / 415
页数:5
相关论文
共 50 条
  • [41] A Survey on Attacks in Remote User Authentication Scheme
    Limbasiya, Trupil
    Doshi, Nishant
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 1157 - 1160
  • [42] A Continuous User Authentication Scheme for Mobile Devices
    Smith-Creasey, Max
    Rajarajan, Muttukrishnan
    [J]. 2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [43] A user authentication scheme with identity and location privacy
    Hirose, S
    Yoshida, S
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 235 - 246
  • [44] A remote authentication scheme preserving user anonymity
    Chien, HY
    Chen, CH
    [J]. AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, 2005, : 245 - 248
  • [45] An Improved User-Participating Authentication Scheme
    Shi, Huang
    Cao, Tianjie
    Gao Caiyun
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (06): : 115 - 124
  • [46] Cryptanalysis and improvement of a remote user authentication scheme
    Ou Qingyu
    Huang Kai
    Li Guang
    [J]. ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL IV, PROCEEDINGS, 2009, : 49 - +
  • [47] Efficient User and Broadcast Authentication Scheme for WSNs
    Alabrah, Amerah
    Bassiouni, Mostafa
    [J]. 2014 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2014, : 3052 - 3057
  • [48] Further Improved Remote User Authentication Scheme
    Kim, Jung-Yoon
    Choi, Hyoung-Kee
    Copeland, John A.
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (06) : 1426 - 1433
  • [49] USER AUTHENTICATION SCHEME NOT REQUIRING SECRECY IN COMPUTER
    EVANS, A
    KANTROWITZ, W
    WEISS, E
    [J]. COMMUNICATIONS OF THE ACM, 1974, 17 (08) : 437 - 442
  • [50] A flexible biometrics remote user authentication scheme
    Lin, CH
    Lai, YY
    [J]. COMPUTER STANDARDS & INTERFACES, 2004, 27 (01) : 19 - 23