On Automated Image Choice for Secure and Usable Graphical Passwords

被引:0
|
作者
Dunphy, Paul [1 ]
Olivier, Patrick [1 ]
机构
[1] Newcastle Univ, Sch Comp Sci, Culture Lab, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
关键词
Usability; Security; User Authentication; SIMILARITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The usability of graphical passwords based upon recognition of images is widely explored. However, it is likely that their observed high memorability is contingent on certain attributes of the image sets presented to users. Characterizing this relationship remains an open problem; for example, there is no systematic (and empirically verified) method to determine how similarity between the elements of an image set impacts the usability of the login challenge. Strategies to assemble suitable images are usually carried out by hand, which represents a significant barrier to uptake as the process has usability and security implications. In this paper, we explore the role of simple image processing techniques to provide automated assembly of usable login challenges in the context of recognition-based graphical passwords. We firstly carry out a user study to obtain a similarity ranked image set, and use the results to select an optimal per-pixel image similarity metric. Then we conduct a short-term image recall test using Amazon Mechanical Turk with 343 subjects where we manipulated the similarity present in image grids. In the most significant case, we found that our automated methods to choose decoy images could impact the login success rate by 40%, and the median login duration by 35 seconds.
引用
收藏
页码:99 / 108
页数:10
相关论文
共 50 条
  • [1] Can Long Passwords Be Secure and Usable?
    Shay, Richard
    Komanduri, Saranga
    Durity, Adam L.
    Huh, Phillip
    Mazurek, Michelle L.
    Segreti, Sean M.
    Ur, Blase
    Bauer, Lujo
    Christin, Nicolas
    Cranor, Lorrie Faith
    [J]. 32ND ANNUAL ACM CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2014), 2014, : 2927 - 2936
  • [2] Secure Human Authentication with Graphical Passwords
    Dagvatur, Zayabaatar
    Mohaisen, Aziz
    Lee, Kyunghee
    Nyang, DaeHun
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (04): : 1247 - 1259
  • [3] Graphical Passwords: Requisite for Secure Information Systems
    Abbasi, Kashif
    Zin, Abdullah Mohd
    Mokhtar, Mohd Rosmadi
    [J]. ADVANCED SCIENCE LETTERS, 2016, 22 (10) : 2809 - 2813
  • [4] Secure User Authentication with Graphical Passwords and PassText
    Mohd, Raj Mohammed
    Bindu, C. Shoba
    Vasumathi, D.
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 523 - 533
  • [5] GRAPHICAL PASSWORDS IMPLIES ON TOLERANCE PASSWORD, IMAGE CHOICE, AND PUZZLE LOGIN SECURITY
    Gunaseeli, L.
    Canessane, R. Aroul
    [J]. 2017 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2017,
  • [6] A Study on an Image Synthesis Method for Graphical Passwords
    Hasegawa, Madoka
    Tanaka, Yuichi
    Kato, Shigeo
    [J]. 2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ISPACS 2009), 2009, : 643 - 646
  • [7] Knock Yourself Out: Secure Authentication with Short Re-Usable Passwords
    Gueldenring, Benjamin
    Roth, Volker
    Ries, Lars
    [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [8] Usable Authentication Mechanisms for Mobile Devices: An Exploration of 3D Graphical Passwords
    Yu, Zhen
    Olade, Ilesanmi
    Liang, Hai-Ning
    Fleming, Charles
    [J]. 2016 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2016,
  • [9] On Purely Automated Attacks and Click-Based Graphical Passwords
    Salehi-Abari, Amirali
    Thorpe, Julie
    van Oorschot, P. C.
    [J]. 24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 111 - 120
  • [10] Purely Automated Attacks on PassPoints-Style Graphical Passwords
    van Oorschot, Paul C.
    Salehi-Abari, Amirali
    Thorpe, Julie
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (03) : 393 - 405