We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Cued Click Points Graphical Images and Text Password along with Pixel based OTP Authentication

by A. Abuthaheer, N. S. Jeya Karthikka, T. M. Thiyagu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 87 - Number 2
Year of Publication: 2014
Authors: A. Abuthaheer, N. S. Jeya Karthikka, T. M. Thiyagu
10.5120/15184-3535

A. Abuthaheer, N. S. Jeya Karthikka, T. M. Thiyagu . Cued Click Points Graphical Images and Text Password along with Pixel based OTP Authentication. International Journal of Computer Applications. 87, 2 ( February 2014), 45-49. DOI=10.5120/15184-3535

@article{ 10.5120/15184-3535,
author = { A. Abuthaheer, N. S. Jeya Karthikka, T. M. Thiyagu },
title = { Cued Click Points Graphical Images and Text Password along with Pixel based OTP Authentication },
journal = { International Journal of Computer Applications },
issue_date = { February 2014 },
volume = { 87 },
number = { 2 },
month = { February },
year = { 2014 },
issn = { 0975-8887 },
pages = { 45-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume87/number2/15184-3535/ },
doi = { 10.5120/15184-3535 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:04:55.993813+05:30
%A A. Abuthaheer
%A N. S. Jeya Karthikka
%A T. M. Thiyagu
%T Cued Click Points Graphical Images and Text Password along with Pixel based OTP Authentication
%J International Journal of Computer Applications
%@ 0975-8887
%V 87
%N 2
%P 45-49
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A graphical password uses images or representation of images as passwords. Human brain is easily remembering the Graphical image secret word compare to Text secret word. There are dissimilar graphical image secret word methods or graphical image secret word software's are available in the market. The proposed work merges Cued click points, text and token based verification. The main objective of this proposal is to reduce the guessing attacks as well as encouraging users to select more random, and difficult to guess password. Well known security threats like brute force attacks and dictionary attacks can be successfully abolished using this method.

References
  1. Sonia Chiasson, Elizabeth Stobert, Alain Forget, Robert Biddle, and Paul C. van Oorschot, 2012," Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism," to be published in IEEE Transactions, vol. 9, no. 2.
  2. Biddle R, Chiasson S, and van Oorschot P,2012, "Graphical Passwords: Learning from the First Twelve Years," to be published in ACM Computing Surveys, vol. 44, no. 4.
  3. Chiasson S, Biddle R, and van Oorschot P,2007, "A Second Look at the Usability of Click-Based Graphical Passwords," Proc. ACM Symp. Usable Privacy and Security (SOUPS).
  4. Chiasson S, van Oorschot P, and Biddle R,2007, "Graphical Password Authentication Using Cued Click Points," Proc. European Symp. Research in Computer Security (ESORICS), pp. 359-374.
  5. Chiasson S, Forget A, Biddle R, and van Oorschot P,2008 ,"Influencing Users towards Better Passwords: Persuasive Cued Click-Points," Proc. British HCI Group Ann. Conf. People and Computers: Culture, Creativity, Interaction.
  6. Chiasson S, Forget A, Stobert E, van Oorschot P, and Biddle R, 2009,"Multiple Password Interference in Text and Click-Based Graphical Passwords," Proc. ACM Conf. Computer and Comm. Security (CCS).
  7. Chiasson S, Forget A, Biddle R, and van Oorschot P. C,2009, "User Interface Design Affects Security: Patterns in Click-Based Graphical Passwords," Int'l J. Information Security, vol. 8, no. 6, pp. 387- 398.
  8. Jain A, Ross A, and Pankanti S,2006, "Biometrics: A Tool for Information Security," IEEE Trans. Information Forensics and Security (TIFS), vol. 1, no. 2, pp. 125-143.
  9. O'Gorman L, 2003,"Comparing Passwords, Tokens, and Biometrics for User Authentication," Proc. IEEE, vol. 91, no. 12, pp. 2019-2020.
  10. Stobert E, Forget A, Chiasson S, van Oorschot P, and Biddle R,2010, "Exploring Usability Effects of Increasing Security in Click-Based Graphical Passwords," Proc. Ann. Computer Security Applications Conf. (ACSAC).
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Graphical Passwords Security OTP