Investigating the Viability of Multifactor Graphical Passwords for User Authentication

被引:1
|
作者
Jali, Mohd Zalisham [1 ]
Furnell, Steven M. [2 ,3 ]
Dowland, Paul S. [2 ]
机构
[1] USIM, Fac Sci Technol, Bandar Baru Nilai 71800, Negeri Sembilan, Malaysia
[2] Univ Plymouth, Ctr Secur Commun & Network Res CSCAN, Plymouth, Devon, England
[3] Edith Cowan Univ, Sch Comp & Secur Sci, Perth, WA, Australia
来源
INFORMATION SECURITY JOURNAL | 2014年 / 23卷 / 1-2期
关键词
authentication; graphical passwords; knowledge-based authentication; security; usability;
D O I
10.1080/19393555.2014.891274
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication using images (i.e., graphical passwords) is claimed to be one of the alternatives for overcoming weaknesses in the traditional username and password authentication. This paper reports on the study to explore the feasibility of combining two graphical password methods for better security. A graphical password prototype scheme, the Enhanced Graphical Authentication System (EGAS), was developed (which combines the methods of clicking on the image (i.e., click-based) and selecting a series of images (i.e., choice-based). The EGAS was tested by 30 participants randomly chosen from the authors' university and two evaluations were made; namely user performance of the combined method and the feasibility of authentication strategies toward the introduced method itself. From both evaluations, it is found that positive results have been obtained, which suggest that these methods could be combined together effectively without giving impediment to users.
引用
收藏
页码:10 / 21
页数:12
相关论文
共 50 条
  • [1] Investigating the Viability of Multifactor Graphical Passwords for User Authentication (vol 23, pg 10, 2014)
    Jali, Mohd Zalisham
    Furnell, Steven M.
    Dowland, Paul S.
    [J]. INFORMATION SECURITY JOURNAL, 2022, 31 (02): : 251 - 251
  • [2] Secure User Authentication with Graphical Passwords and PassText
    Mohd, Raj Mohammed
    Bindu, C. Shoba
    Vasumathi, D.
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 523 - 533
  • [3] A remote user authentication scheme using strong graphical passwords
    Ku, WC
    Tsaur, MJ
    [J]. LCN 2005: 30th Conference on Local Computer Networks, Proceedings, 2005, : 351 - 355
  • [4] Are Graphical Authentication Mechanisms As Strong As Passwords?
    Renaud, Karen
    Mayer, Peter
    Volkamer, Melanie
    Maguire, Joseph
    [J]. 2013 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2013, : 837 - 844
  • [5] Secure Human Authentication with Graphical Passwords
    Dagvatur, Zayabaatar
    Mohaisen, Aziz
    Lee, Kyunghee
    Nyang, DaeHun
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (04): : 1247 - 1259
  • [6] Authentication by Graphical Passwords Method 'Hope'
    Zujevs, Nikita
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2019, : 94 - 99
  • [7] A more Multifactor Secure Authentication Scheme based on graphical authentication
    Joshi, Ashish
    Kumar, Sonu
    Goudar, R. H.
    [J]. 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS (ICACC), 2012, : 186 - 189
  • [8] TwoStep: An Authentication Method Combining Text and Graphical Passwords
    van Oorschot, P. C.
    Wan, Tao
    [J]. E-TECHNOLOGIES-INNOVATION IN AN OPEN WORLD, 2009, 26 : 233 - 239
  • [9] Automatic Registration of User Drawn Graphical Passwords
    Jebriel, Salem
    Poet, Ron
    [J]. 2014 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2014, : 172 - 177
  • [10] User authentication via behavior based passwords
    Yampolskiy, Roman V.
    [J]. 2007 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE, 2007, : 10 - +