CFP last date
20 March 2024
Call for Paper
April Edition
IJCA solicits high quality original research papers for the upcoming April edition of the journal. The last date of research paper submission is 20 March 2024

Submit your paper
Know more
Reseach Article

Reduction of Password Guessing Attacks using Click Point

Published on March 2014 by Papiya Biswas, M. M. Patil, Mohua Biswas
Emerging Trends in Electronics and Telecommunication Engineering 2013
Foundation of Computer Science USA
NCET - Number 1
March 2014
Authors: Papiya Biswas, M. M. Patil, Mohua Biswas
8055e097-1aa0-4816-ba05-7c5f39a63e69

Papiya Biswas, M. M. Patil, Mohua Biswas . Reduction of Password Guessing Attacks using Click Point. Emerging Trends in Electronics and Telecommunication Engineering 2013. NCET, 1 (March 2014), 16-19.

@article{
author = { Papiya Biswas, M. M. Patil, Mohua Biswas },
title = { Reduction of Password Guessing Attacks using Click Point },
journal = { Emerging Trends in Electronics and Telecommunication Engineering 2013 },
issue_date = { March 2014 },
volume = { NCET },
number = { 1 },
month = { March },
year = { 2014 },
issn = 0975-8887,
pages = { 16-19 },
numpages = 4,
url = { /proceedings/ncet/number1/15650-1415/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Emerging Trends in Electronics and Telecommunication Engineering 2013
%A Papiya Biswas
%A M. M. Patil
%A Mohua Biswas
%T Reduction of Password Guessing Attacks using Click Point
%J Emerging Trends in Electronics and Telecommunication Engineering 2013
%@ 0975-8887
%V NCET
%N 1
%P 16-19
%D 2014
%I International Journal of Computer Applications
Abstract

The main aim of the work on the subject is to reduce password guessing attack in a computer security system by creating graphical passwords for which pixels are chosen from images. In a computer security system, human-computer interaction depends on proper authentication of the system. For the attackers, memorable passwords are easy to guess. Hence, researchers of modern days have opted for an alternative method wherein graphical pictures are used as passwords. Human brain recollects picture better than textual character. Hence, graphical passwords are created using images or representation of images.

References
  1. Srinath Akula, Veerabhadram Devisetty, Image based registration and authentication system, Department of Computer Science St. Cloud State University, St. Cloud, MN 56301.
  2. L. O'Gorman, Comparing passwords, tokens, and biometrics for user authentication, Proc. IEEE, vol. 91, no. 12, pp. 2019-2020, Dec. 2003.
  3. A. Jain, A. Ross, and S. Pankanti, Biometrics: a tool for information security, IEEE Trans. Information Forensics and Security (TIFS), vol. 1, no. 2, pp. 125-143, June 2006.
  4. Cynthia Kuo, Sasha Romano sky, Lorrie Faith Cranor, Human selection of mnemonic phrase-based passwords, 2006, July 12.
  5. S. Chiasson, A. Forget, R. Biddle and P. van Oorschot, Influencing users towards better passwords: persuasive cued click- points, Proc. British HCI Group Ann. Conf. People and Computers: Culture, Creativity, Interaction, Sept. 2008.
  6. Amirali Salehi-Abari, Julie Thorpe, and P. C. van Oorschot, On purely automated attacks and click- based graphical passwords, December 8- 12, 2008.
  7. Sonia Chiasson1, Alain Forget1, Elizabeth Stobert2, P. C. van Oorschot1, Robert Biddle1 1School of Computer Science, Multiple password interference in text passwords and click-based graphical passwords, Department of Psychology Carleton University, Ottawa, Canada, November 2009.
  8. Sonia Chiasson, Alain Forget, Robert Biddle, P. C. van Oorschot, User interface design aspects security: patterns in click-based graphical passwords, April 9, 2009.
  9. Jitao Sang, Changsheng Xu, Senior Member, Robust face-name graph matching for movie character identification, 2010 IEEE.
  10. E. Stobert, A. Forget, S. Chiasson, P. van Oorschot, and R. Biddle, Exploring usability effects of increasing security in click-based graphical passwords, Proc. Ann. Computer Security Applications Conf. (ACSAC), 2010.
  11. Sonia Chiasson, Member, IEEE, Elizabeth Stobert, Alain Forget, Robert Biddle, Member, IEEE and P. C. van Oorschot, Persuasive cued click points: design, implementation and evaluation of a knowledge-based authentication mechanism, 25th October, 2011.
  12. International Journal of Research in Engineering & Advanced Technology, A persuasive cued click-point based authentication mechanism with dynamic user blocks, Volume 1, Issue 1 March, 2013.
  13. K. Semmangaiselvi1,T. Vamsidhar2,KothaHariChandana, B. Krishna Priya and E. Nalina, An effective secure environment using graphical password authentication scheme, Volume 2 Issue 2 Feb 2013.
  14. Aswathy Nair, Theresa Rani Joseph, Jenny Maria Johny, A proficient multilevel graphical authentication system, IJSETR Volume 2, No 6, June 2013.
  15. Andreas Bulling, Florian Alt, Albrecht Schmidt, Increasing the security of gaze-based cued-recall graphical passwords using saliency masks, CHI'12, May 5–10, 2012, Austin, Texas, USA.
  16. Alireza Pirayesh Sabzevar, Angelos Stavrou, Universal multi-factor authentication using graphical passwords, Computer Science Department, George Mason University.
  17. Xiongwu Xia, Lawrence O'Gorman Innovations in fingerprint capture devices, Veridicom Inc. 31 Scotto Pl, Dayton, NJ 08810, USA Received21 December 2001.
  18. S. Pankanti, R. M. Bolle, A. Jain, Biometrics: the future of identification, special issue of Computer, Vol. 33, no. 2, Feb. 2000.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Persuasive Cued Click Point Graphical Password Images Guessing Attack User Security.