Sequential Graphical Password Framework for Mobile Devices

被引:0
|
作者
Hui, Liew Tze [1 ]
Bashier, Housam Khalifa [1 ]
Hoe, Lau Siong [1 ]
Kwee, Wee Kouk [1 ]
Abdullah, Mohd Fikri Azli [1 ]
机构
[1] Multimedia Univ, Fac Informat Sci & Technol, Jalan Ayer Keroh Lama, Melaka 75450, Malaysia
关键词
graphical password; security; authentication;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
nowadays, computer systems are very essential for human daily life for its ability to store and retrieve data in a more meaningful way. Thus, the data stored in computer system contains a very critical and important information and therefore, there's a critical needs to put more effort in handling of such data. Based on the traditional method, the most popular authentication way for computer security is using alphanumeric password. However, this type of authentication method come with few drawbacks. In recent years, many new methods have been developed by researchers to overcome the limitation of the password authentication, and one of the most popular method is known as graphical password, which utilizes picture as password instead of the alphanumeric string. Hence, this paper propose a new graphical password framework and method to be used in mobile-platform. Finally, the experiments results demonstrated the effectiveness of the proposed solution.
引用
收藏
页码:194 / 198
页数:5
相关论文
共 50 条
  • [41] A Framework for Communication Planning on Mobile Devices
    Kopena, Joseph B.
    Regli, William C.
    19TH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI-05), 2005, : 1661 - 1662
  • [42] A Visual One-Time Password Authentication Scheme Using Mobile Devices
    Chow, Yang-Wai
    Susilo, Willy
    Au, Man Ho
    Barmawi, Ari Moesriami
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 243 - 257
  • [43] Enhanced graphical captcha framework and applications to strong security authenticated scheme without password table
    Zhu, Hong-Feng
    Zhang, Yan
    Xia, Yu
    Journal of Information Hiding and Multimedia Signal Processing, 2015, 6 (06): : 1295 - 1309
  • [44] Graphical Passwords: A Qualitative Study of Password Patterns
    Vorster, Jo
    van Heerden, Renier
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 375 - 383
  • [45] User authentication by secured graphical password implementation
    Bandyopadhyay, Samir Kumar
    Bhattacharyya, Debnath
    Das, Poulami
    2008 7TH ASIA-PACIFIC SYMPOSIUM ON INFORMATION AND TELECOMMUNICATION TECHNOLOGIES, 2008, : 7 - +
  • [46] Analysis and Evaluation of the ColorLogin Graphical Password Scheme
    Gao, Haichang
    Liu, Xiyang
    Dai, Ruyi
    Wang, Sidong
    Chang, Xiuling
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON IMAGE AND GRAPHICS (ICIG 2009), 2009, : 722 - 727
  • [47] A Systematic Literature Review of Graphical Password Schemes
    Shammee T.I.
    Akter T.
    Mou M.
    Chowdhury F.
    Ferdous M.S.
    Chowdhury, Farida (farida-cse@sust.edu), 1600, Korean Institute of Information Scientists and Engineers (16): : 163 - 185
  • [48] Token-based graphical password authentication
    Gyorffy, John Charles
    Tappenden, Andrew F.
    Miller, James
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (06) : 321 - 336
  • [49] An Enhanced Drawing Reproduction Graphical Password Strategy
    Liu, Xi-Yang
    Gao, Hai-Chang
    Wang, Li-Ming
    Chang, Xiu-Ling
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2011, 26 (06) : 988 - 999
  • [50] My Personal Images as My Graphical Password
    Sosa-Valles, P. A.
    Villalobos-Serrano, J. G.
    Velarde-Alvarado, P.
    Garcia, V.
    Parra-Michel, J. R.
    Mena, L.
    Martinez-Pelaez, R.
    IEEE LATIN AMERICA TRANSACTIONS, 2018, 16 (05) : 1516 - 1523