User dynamics in graphical authentication systems

被引:0
|
作者
Revett, Kenneth [1 ]
Jahankhani, Hamid [2 ]
de Magalhaes, Sergio Tenreiro [3 ]
Santos, Henrique M. D. [3 ]
机构
[1] Univ Westminster, Harrow Sch Comp Sci, London W1R 8AL, England
[2] Univ East London, London E15 4LZ, England
[3] Univ Minho, Dept Informat SystmsCampus Azurem, P-4719 Braga, Portugal
来源
关键词
Accot-Zhai steering law; biometrics; Fitt's law; graphical authentication systems; Match-n-Go;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, a graphical authentication system is presented which is based on a matching scheme. The user is required to match up thumbnail graphical images that belong to a variety of categories - in an order based approach. The number of images in the selection panel was varied to determine how this effects memorability. In addition, timing information was included as a means of enhancing the security level of the system. That is, the user's mouse clicks were timed and used as part of the authentication process. This is one of the few studies that employ a proper biometric facility, namely mouse dynamics, into a graphical authentication system. Lastly, this study employees the use of the 2-D version of Fitts' law, the Accot-Zhai streering law, which is used to examine the effect of image size on usability. The results from this study indicate that the combination of biometrics (mouse timing information) into a graphical authentication scheme produces FAR/FRR values that approach textual based authentication schemes.
引用
收藏
页码:173 / +
页数:3
相关论文
共 50 条
  • [1] Graphical based user authentication with embedded mouse stroke dynamics
    Revett, Kenneth
    Zia, Asim
    de Magalhaes, Sergio Tenreiro
    Santos, Henrique
    [J]. ICIW 2007: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 171 - +
  • [2] GRAPHICAL AUTHENTICATION BASED ON USER BEHAVIOUR
    Al-Khazzar, Ahmed
    Savage, Nick
    [J]. SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 86 - 89
  • [3] A Hybrid Graphical User Authentication Scheme
    Saeed, Swaleha
    Umar, M. Sarosh
    [J]. 2015 COMMUNICATION, CONTROL AND INTELLIGENT SYSTEMS (CCIS), 2015, : 411 - 415
  • [4] Graphical User Authentication Algorithm for Mobile Banking User
    Ugochukwu, Ejike Ekeke Kingsley
    Jusoh, Yusmadi Yah
    Yasin, Sharifah Md
    Abdullah, Azizol
    Abdullah, Salfarina
    [J]. ADVANCED SCIENCE LETTERS, 2018, 24 (07) : 5182 - 5186
  • [5] User authentication by secured graphical password implementation
    Bandyopadhyay, Samir Kumar
    Bhattacharyya, Debnath
    Das, Poulami
    [J]. 2008 7TH ASIA-PACIFIC SYMPOSIUM ON INFORMATION AND TELECOMMUNICATION TECHNOLOGIES, 2008, : 7 - +
  • [6] Secure User Authentication with Graphical Passwords and PassText
    Mohd, Raj Mohammed
    Bindu, C. Shoba
    Vasumathi, D.
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 523 - 533
  • [7] A Graphical Interface for User Authentication on Mobile Phones
    Umar, Mohammad Sarosh
    Rafiq, Mohammad Qasim
    [J]. PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER-HUMAN INTERACTIONS (ACHI 2011), 2011, : 69 - 74
  • [8] Graphical User Authentication Algorithms Based on Recognition: A Survey
    Saadi, Zena M.
    Sadiq, Ahmed T.
    Akif, Omar Z.
    [J]. ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY, 2024, 12 (02): : 79 - 93
  • [9] Investigating the Viability of Multifactor Graphical Passwords for User Authentication
    Jali, Mohd Zalisham
    Furnell, Steven M.
    Dowland, Paul S.
    [J]. INFORMATION SECURITY JOURNAL, 2014, 23 (1-2): : 10 - 21
  • [10] Tri-Pass: A new graphical user authentication scheme
    [J]. 1600, North Atlantic University Union NAUN (08):