Open Access   Article Go Back

A quantitative report on the present strategies of Graphical authentication

Norman Dias1 , eeja S R2

Section:Survey Paper, Product Type: Journal Paper
Volume-06 , Issue-10 , Page no. 64-73, Nov-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6si10.6473

Online published on Nov 30, 2018

Copyright © Norman Dias, Reeja S R . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Norman Dias, Reeja S R, “A quantitative report on the present strategies of Graphical authentication,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.10, pp.64-73, 2018.

MLA Style Citation: Norman Dias, Reeja S R "A quantitative report on the present strategies of Graphical authentication." International Journal of Computer Sciences and Engineering 06.10 (2018): 64-73.

APA Style Citation: Norman Dias, Reeja S R, (2018). A quantitative report on the present strategies of Graphical authentication. International Journal of Computer Sciences and Engineering, 06(10), 64-73.

BibTex Style Citation:
@article{Dias_2018,
author = {Norman Dias, Reeja S R},
title = {A quantitative report on the present strategies of Graphical authentication},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {06},
Issue = {10},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {64-73},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=529},
doi = {https://doi.org/10.26438/ijcse/v6i10.6473}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i10.6473}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=529
TI - A quantitative report on the present strategies of Graphical authentication
T2 - International Journal of Computer Sciences and Engineering
AU - Norman Dias, Reeja S R
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 64-73
IS - 10
VL - 06
SN - 2347-2693
ER -

           

Abstract

The foremost common authentication strategy is to use alphanumeric usernames and passwords. This strategy has been appeared to posses critical disadvantages. Clients prefer to choose passwords which are effectively speculated. At the same time, if the password is difficult to figure, then at that point its obviously difficult to keep in mind. To solve this issue a few analyst have created verification strategy’s that utilizes images as passwords. This paper examines the qualities of the existing graphical passwords methodologies and we try to answer a question “whether a graphical password more secure to a text based password”?

Key-Words / Index Term

Authentication strategy, graphical passwords, secure passwords

References

[1] Fledmeier, D’ and Karn, P., UNIX password security ten years later .In proceedings of the 19th International Conference on Advances in Cryptology (CRYPTO ‘89). Lecture Notes in Computer Science, Vol 435, Springer , Verlag
[2] Sobrado , L, Briget,J.C.,Graphical Password , The Rutgers Scholar, An electronic bulletin of Undergraduate Research, Vol 4. 2007
[3] Adams, A., Sasse, M.A.and Lunt, P., Making Passwords Secure and Usable, in H.Thimbleby, leby, B. O’connailal and P. Thomas(Eds), HCI’97-people and computers XII, Springer-Verlag, Bristol ,pp.1-20,1997
[4] L.Y.Por, X.T.Lim,M.T.Su,F.Kianoush. The Design and Implementation of Background Pass-Go Scheme Towars Security Threat, WSEAS Transactions on INFORMATION SCIENCE & APPLICATION ISSN:1790-0832,Issue 6,Volume 5 June 2008.
[5] Wanli Ma,John Campbell,Dat Tran and Dale Kleeman, A conceptual Fran=me work for accessing Passwords Quality,IJCSNS, International Journal of Computer Science and Network Security, Vol. 7 No1 pp 179-185,2007
[6] Klein, D., Foiling the Cracker: a Survey of improvements to password security, Proceedings of the 2nd USENIX security workshop,http://www.citeseer.ist.psu.edu/112514.html,May 2008
[7] Paivio A., Rogers, T.B., and Symthe,P.C. 1968. Why are pictures easier to recall than words? Psychonomic Science,11:137-138,1968
[8] R.Dhamija and A.Perrig,”Déjà vu: A user Study using Images for authentication”, in Proceedings of 9th USENIX Security Symposium,2000
[9] T. Pering, M. Sundar, J. Light, Roy W,” Photographic Authentication through Untrusted Terminals”, IEEE Pervasive Computing, January 2003,PP 30-36
[10] S.Akula & V. Devisetty, ” Image Based Registration and Authentication System” in Proceedings of Midwest Instruction & Computing Symposium,2004
[11] S.Wiedenbeck, j. Waters,J.C. Birget, A.Brodskiy, N.Memon, “Design and Longitudinal evaluation of a graphical password system”, International Journal of Human Computer Studies 63(2005) 102-127.
[12] L.Y. Por, X. T. Lim, M.T. Su, F. Kianoush,”The Design and Implementation of Background Pass-Go Scheme Towards security Threats” WSEAS Transactions on Information science and Applications, ISSN:1790-0832, Issue 6, Volume 5, June 2008
[13] Dhruv KumarYadav,Beatrice Ionascu, Sai Vamsi Krishna Ongole,Aditi Roy, Nasir Memon, “Design and Analysis of Shoulder Shurfing Resistant Pin Based Authentication Mechanisms on Google Glass”, International conference on Financial cryptography and Data Security, pppp281-297,2015
[14] Chen Sun,Yang Wang, Jun Zheng “Dissecting pattern unlock:The effect of pattern strength meter on pattern selection” Journal of information security and applicaions Nov 2014, Elsevier,pp308-320
[15] Adam J Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, Jonathan M Smith,”Smudge attacks on smartphone touch screens” WOOT’10 Proceedings of the 4th USENIX conference on Offensive technologies Article No.1-7 Washington DC, USENIX Association Berkley, CA
[16] Sebastian Uellenbeck, Markus Durmuth, Christopher Wolf and Thorsten Holz, CCS’13 Proceedings of the 2013 ACM SIGSAC conference of Computer & Communication security, Pages 161-172. Berlin Germany November 04-08,2013, ACM New york NY
[17] Blasé Ur, Patrick Gage Kelley,saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek,Timothy Passaro, Richard Shay,Timothy Vidas,Lujo Bauer, Nicholas Christin,Lorrie Faith Cranor,”How does your Password measure up?” The effet of strength meters on password creation”, ACM,Proceeding Security’12 Proceedings of the 21st USENIX conference on Security Symposium, Bellevue ,WA, USENIX Association Berkeley, CA,USA.
[18] Serge Egelman, Andreas Sotirakopoulos, Ildar Muslukhov, Konstantin Beznosov, Cormac Herley, “Does my password go up to eleven? The impact of Password Meters on Password Selection” CHI’13 ,Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Pg 2379-2388, Paris, France –April 27- May 02-2013
[19] Blasé Ur, Felicia Alfieri, maung Aung,Lujo Bauer, Nicholas Christin, Jessica Colnago, Lorrie Faith Cranor, henry Dixon, Pardis Emami Naeini, Hana Habib, Noah Johnson, William Melicher, “Design and evaluation of Data-Driven Password Meter” CHI’17 ,Conference on Human Factors in Computing Systems, pg. 3775-3786,ACM ,ISBN:978-1-4503-4655-9
[20] L.D. Paulson “Taking a graphical Password to the approach”, Computer(Volume 35,Issue 7,July 2002),IEEE Computer Society
[21] S. Brostoff and M. A.Sasse, “Are Passfaces maore usable than passwords”, a field trial investigation in peiolple and computers XIV- Usability or Else:Proceedings of HCI, Sunderland, Uk: Springer-Verlag 2000
[22] D. Davis F. Monrose and M.K. Reiter,”On User choice in graphical Password Scheme” in proceedings of the 13th USENIX Security Symposium, San Diego, CA , 2004
[23] W.Jansen, S. gavrila, V Korolev, R Ayers and R Swanstorm, “Picture Password: A Visual Login technique for Mobile devices” National Institute of Standards and Technology Interagency Report NISTIR 7030,2003
[24] W. A. Jansen “Authenticating users on Handheld Devices” in proceedings of Canadian Information Technology Security Symposium,2003
[25] W.Jansen “Authenticating Mobile Device Users through image Selection” in Data Security,2004