CFP last date
20 January 2025
Reseach Article

Usability and Security of Recognition based Graphical Password Scheme

Published on February 2016 by Pranita Binnar, Vanita Mane
International Conference on Advances in Science and Technology
Foundation of Computer Science USA
ICAST2015 - Number 3
February 2016
Authors: Pranita Binnar, Vanita Mane
61cb620e-8654-4490-a389-8ee68c30f9ea

Pranita Binnar, Vanita Mane . Usability and Security of Recognition based Graphical Password Scheme. International Conference on Advances in Science and Technology. ICAST2015, 3 (February 2016), 20-23.

@article{
author = { Pranita Binnar, Vanita Mane },
title = { Usability and Security of Recognition based Graphical Password Scheme },
journal = { International Conference on Advances in Science and Technology },
issue_date = { February 2016 },
volume = { ICAST2015 },
number = { 3 },
month = { February },
year = { 2016 },
issn = 0975-8887,
pages = { 20-23 },
numpages = 4,
url = { /proceedings/icast2015/number3/24233-3030/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Science and Technology
%A Pranita Binnar
%A Vanita Mane
%T Usability and Security of Recognition based Graphical Password Scheme
%J International Conference on Advances in Science and Technology
%@ 0975-8887
%V ICAST2015
%N 3
%P 20-23
%D 2016
%I International Journal of Computer Applications
Abstract

Authentication is the first line of defense against compromising confidentiality and integrity. People can remember pictures better and for longer periods than alphanumeric passwords. All graphical passwords have two different aspects which are usability and security. Woefully none of these schemes were being able to fulfill both of these aspects at the same time. We analyze the known attack method and categorize them into two kinds Attack by Password Space and Attack by Password Capture. In this paper we summarized the usability and security reported in some user's studies of recognition based graphical password schemes. Finally some suggestion were given

References
  1. A. Paivio. "Mind and Its Evolution",A Dual Coding Theoretical Approach. Lawrence Erlbaum: Mahwah, N. J. ,2006.
  2. Renaud, K. Mayer, P. Volkamer, M. Maguire, J. , "Are graphical authentication mechanisms as strong as passwords?," Computer Science and Information Systems (FedCSIS), 2013 Federated Conference on , vol. , no. , pp. 837,844, 8-11 Sept. 2013
  3. Hafiz, M. D. , Abdullah, A. H. , Ithnin, N. , Mammi, H. K. , "Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique," Modeling and Simulation, 2008. AICMS 08. Second Asia International Conference on , vol. , no. , pp. 396,403,13-15 May 2008
  4. Haichang Gao, Ning Liu, Kaisheng Li, Jinhua Qiu, "Usability and Security of the Recall-Based Graphical Password Schemes", High Performance Computing and Communications and 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC EUC), 2013 IEEE 10th International Conference on , vol. , no. , pp. 2237,2244,13-15 Nov. 2013
  5. Yadav U. D, Mohod, P. S. , "Adding persuasive features in graphical password to increase the capacity of KBAM," Emerging Trends in Computing, Communication and Nanotechnology (ICECCN), 2013 International Conference on , vol. , no. , pp. 513,517, 25-26 March 2013
  6. R. Dhamija and A. Perrig. Deja Vu "A user study using images for authentication". In 9th USENIX Security Symposium, 2000
  7. Real user corporation,"the science behind passfaces," 2004[online]. available: http://www. realuser. com
  8. D. Davis, F. Monrose, and M. Reiter. "On user choice in graphical password schemes". In 13th USENIX Security Symposium, 2004
  9. E. Hayashi, N. Christin, R. Dhamija, and A. Perrig. "Use Your Illusion:Secure authentication usable anywhere". In 4th ACM Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, July 2008
  10. D. Weinshall. "Cognitive authentication schemes safe against spyware". In IEEE Symposium on Security and Privacy,May 2006.
  11. S. Wiedenbeck, J. Waters, L. Sobrado, and J. Birget. Design and evaluation of a shoulder surfing resistant graphical password scheme. In International Working Conference on Advanced Visual Interfaces (AVI), May 2006.
  12. Bevan, Nigel. "Quality in use: Meeting user needs for quality. " Journal of Systems and Software 49. 1 (1999): 89-96.
  13. Rasekgala, M. , Ewert, S. , Sanders, I. , Fogwill, T. , "Requirements for secure graphical password schemes," IST-Africa Conference Proceedings, 2014 , vol. , no. , pp. 1,10, 7-9 May 2014
  14. G. Orgill, G. W. Romney and P. M. Orgill: "The Urgency for Effective User Privacy Education to Counter Social Engineering Attacks on Secure Computer Systems. In: Proceedings of the 5th Conference on Information Technology Education. pp. 177-181, 2004.
  15. R. Biddle, S. Chiasson, and P. C. van Oorschot. "Graphical passwords: Learning from the First Twelve Years. ACM Computing Surveys, 44(4), Article 19:1-41, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Recognition Base Graphical Password Scheme graphical Password Authentication usability security Attack