CFP last date
20 December 2024
Reseach Article

User Authentication by Secured Graphical Password Implementation

by Ankesh Khandelwal, Shashank Singh, Niraj Satnalika
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 25
Year of Publication: 2010
Authors: Ankesh Khandelwal, Shashank Singh, Niraj Satnalika
10.5120/449-751

Ankesh Khandelwal, Shashank Singh, Niraj Satnalika . User Authentication by Secured Graphical Password Implementation. International Journal of Computer Applications. 1, 25 ( February 2010), 100-104. DOI=10.5120/449-751

@article{ 10.5120/449-751,
author = { Ankesh Khandelwal, Shashank Singh, Niraj Satnalika },
title = { User Authentication by Secured Graphical Password Implementation },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 25 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 100-104 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number25/449-751/ },
doi = { 10.5120/449-751 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:49:23.610468+05:30
%A Ankesh Khandelwal
%A Shashank Singh
%A Niraj Satnalika
%T User Authentication by Secured Graphical Password Implementation
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 25
%P 100-104
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

For the vast majority of computer systems, passwords are the method of choice for authenticating users. The most widely and commonly used authentication is traditional "Username" and "Password". For such authentication generally text (alphanumeric) is used. It is well-known, however, that passwords are susceptible to attack: users tend to choose passwords that are easy to remember, and often this means that they are also easy for an attacker to obtain by searching for candidate passwords. On the other hand, if a password is hard, then it is often hard to remember. Keeping these things in mind we propose a novel, innovative and more secure way of selecting passwords: Graphical Passwords.

References
  1. A S. Patrick, A C. Long, and S. Flinn, "HCI and Security Systems", presented at Cm, Extended Abstracts (Workshops). Ft Lauderdale, Florida, USA., 2003.
  2. A. Adams and M. A. Sasse, "Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures," Communications of th ACM, vol. 42 pp. 41-46, 1999.
  3. R. Dhamija and A Perrig, "Deja Vu: A User Study Using Images For Authentication", 9th USENIX Security Symposium, 2000.
  4. S. Akula and V. Devisetty, "Image Based Registration and Authentication System," in Proceedings of Midwest Instruction and Computing Symposium, 2004.
  5. A. Perrig and D. Song, "Hash Visualizations: A New Technique To Improve Real-World Security," in Proceedings of the 1999 International Workshop on Cryptographic Techniques and E-Commerce, 1999.
  6. D. Weinshall and S. Kirkpatrick, "Passwords You'll Never Forget, but Can't Recall," in Proceedings of Conference on Hman Factors in Computing Systems (CHI), Vienna, Austria: ACM, 2004.
  7. L. Sabrado and J. C. Birget, "Graphical passwords", The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research, vol 4, 2002.
  8. S. Man, D. Hong, and M. Mathews, "A Shoulder-Surfing resistant graphical password scheme," in Proceedings of International Conference on security and management Las Vegas, NV, 2003.
  9. D.Davis, F. Monrose, and M. K. Reiter, "On user choice in graphical password schemes," in Proceedings of the 13th Usenix Security Symposium, San Diego, CA, 2004.
  10. D. Hong, S. Man, B. Hawes, and M. Mathews, "A password scheme strongly resistant to spyware", in Proceedings of International Conference on security and management Las Vegas, NV, 2003.
  11. RealUser, www.realuser.com. last accessed in June, 2005.
  12. W. Jansen, "Authenticating Mobile Device Users Through Image Selection," in Data Security, 2004.
  13. W. Jnasen, S. Gavrila, V. Korolev, R. Ayers, and R. Swanstrom, "Picture Password:A Visual Login Technique for Mobile Devices," National Institute of Standards and Technology Interagency Report NISTIR 7030, 2003.
  14. W. Jansen, "Authenticating Users on Handheld Devices," in Proceedings of Canadian Information Technology Security Symposium, 2003.
  15. I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, "The Design and Analysis of Graphical Passwords," in Proceedings of the 8th USENIX Security Symposium, 1999.
  16. T. Takada and H. Koike, "Awase-E: Image-based Authentication for Mobile Phones using User's Favorite Images," in Human-Computer Interaction with Mobile Devices and Services, vol. 2795/2003: Springer-Verlag GmbH, 2003, pp. 347-351.
  17. J. Thorpe and P. C. v. Oorschot, "Graphical Dictionaries and the Memorable Space of Graphical Passwords," in Proceedings of the 20th Annual Computer Security Applications Conference Tueson, Arizona, 2004.
  18. Julie Thorpe and P.C. van Oorschot, ''Towards Secure Design Choices for Implementing Graphical Passwords", IEEE CS Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC'04).
  19. J. Goldberg, J. Hagman, V. Sazawal, "Doodling Our Way To Better Authentication", CHI '02 extended abstracts on Human Factors in Computer Systems, 2002.
  20. J. Thorpe and P. C. v. Oorschot, "Towards Secure Design Choices for Implementing Graphical Passwords," in 20th Annual Computer Security Applications Conference (ACSAC) Tueson, USA.: IEEE, 2004.
  21. Nali and J. Thorpe, "Analysing User Choice in Graphical Passwords", Technical Report TR-04-o1, School of Computer Science, Carleton University, Canada, 2004.
  22. A. F. Syukri, E. Okamoto, and M. Mambo, "A User Identification System Using Signature Written With Mouse," in Third Australasian Conference on Information Security and Privacy (ACISP): Springer-Verlag Lecture Notes in Computer Science (1948), 1998, pp. 403-441.
  23. Passlogix, "www.passlogix.com," last accessed in June 2005.
  24. G. E. Blonder, "Graphical Passwords," in Lucent Technologies, Inc., Murray Hill, NJ, U. S. Patent, Ed. United States, 1996.
  25. L. D. Paulson, "Taking a Graphical Appraoch to the Password," Computer, vol. 35, pp. 19, 2002.
  26. Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy and Nasir Memon, "Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice", SOUPS'05 Conference, July 6-8, 2005, Pittsburgh, PA, USA.
  27. Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy and Nasir Memon, "PassPoints: Design and longitudinal evaluation of a graphical password system", International Journal of Human-Computer Studies (Special Issue on HCI Research in Privacy and Security) 63, 102-127, 2005. - Elsevier Ltd, http://www.science
  28. Jean-Camille Birget, Dawei Hong and Nasir Memon, uGraphical Passwords Based on Robust Discretization", IEEE Transactions on Information Forensics and Security, Vol. 1, No.3, September 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Graphical Password graphical input interface