CFP last date
20 January 2025
Reseach Article

Security Enhancement of Recall based Graphical Authentication System by using Biometric Features

by Mohd. Aqil Khan, Y.D.S. Arya, Gaurav Agarwal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 128 - Number 7
Year of Publication: 2015
Authors: Mohd. Aqil Khan, Y.D.S. Arya, Gaurav Agarwal
10.5120/ijca2015906611

Mohd. Aqil Khan, Y.D.S. Arya, Gaurav Agarwal . Security Enhancement of Recall based Graphical Authentication System by using Biometric Features. International Journal of Computer Applications. 128, 7 ( October 2015), 34-37. DOI=10.5120/ijca2015906611

@article{ 10.5120/ijca2015906611,
author = { Mohd. Aqil Khan, Y.D.S. Arya, Gaurav Agarwal },
title = { Security Enhancement of Recall based Graphical Authentication System by using Biometric Features },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 128 },
number = { 7 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 34-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume128/number7/22888-2015906611/ },
doi = { 10.5120/ijca2015906611 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:20:48.698595+05:30
%A Mohd. Aqil Khan
%A Y.D.S. Arya
%A Gaurav Agarwal
%T Security Enhancement of Recall based Graphical Authentication System by using Biometric Features
%J International Journal of Computer Applications
%@ 0975-8887
%V 128
%N 7
%P 34-37
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Studies have showed significant convenience in remembering pictorial representation of passwords over the textual passwords. The motivation behind exploring a graphical password scheme is based on the remarkable ability of humans to recall pictures easily. In this paper we are presenting the novel approaches for security of pure recall based techniques with the help of biometric authentication i.e. stroke analysis and mouse movement.

References
  1. A.F. Syukri, E. Okamoto, and M. Mambo. A user identification system using signature written with mouse. In proceedings of ACISP pages403-414. Springer-Verlang1998.
  2. A.Weiss, A. Rarnapanicker, P.Shah, S.nobble, and L.Immohr. Mouse movements’biometric identification: A feasibility Study. In Proc. Student/faculty Research Day,CSIS.Pace University,pages1-8, May 2007.
  3. D.Nali and J.Thorpe. Analyzing user choice in graphical passwords, technical report, may 2004.
  4. G. Blonder. Graphical Passwords. 1996 United States Patent 5559961.
  5. I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin. The design and analysis of graphical passwords. In 8th USENIX Security Symposium, 1999.
  6. J. Goldberg, J. Hagman and V.Sazuwal, “ Doodling our way to better authentication;” presented at proceedings of Human Factors in Computing System (CHI), Minneapolis.minnesota, USA,2002.
  7. J.Thorpe and P.C. van Oorschot Graphical dictionaries and the memorable space of graphical passwords. In proceedings of the 13th USENIX security Symposium, pages 135-150, 2004.
  8. J.Thorpe and P.C. van Oorschot towards secure design choices for implementing graphical passwords. In proceedings of ACSAC, pages 50-60. IEEE Computer Society, 2004
  9. M.Pusara and C.F. Brodley, User reauthentication via mouse movements VizSEC/DMSEC ’04 : Proceedings of the 2004 ACM workshop on Visualization and data mining for computer society, ACM Press, Washington DC, USA, 2004, pp. 1-8.
  10. Sobardo L. and Birget J. (2007). http://rurgersscholar.rurers.edu/volume04/sobrbirg/sobrbirg.htm.
  11. S.Wiedenbeck, J.Waters, J. C. Birget, A. Brodskiy and N. Memon. Passpoints: design and longitudinal evaluation of a graphical password system. Int. J. Hum. Comput. Stud, 63 (1-2): 102-127, 2005.
  12. X. Sou, Y. Zhu, and G.S. Owen. Graphical passwords: A survey in Proceedings of ACSAC, pages 463-472 IEEE Computer Society, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Graphical passwords Recall based graphical passwords Authentication DAS and Biometric Security