CFP last date
20 May 2024
Reseach Article

Textual and Graphical Password Authentication Scheme Resistant to Shoulder Surfing

by Roshni Rajavat, Bhavna Gala, Asmita Redekar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 114 - Number 19
Year of Publication: 2015
Authors: Roshni Rajavat, Bhavna Gala, Asmita Redekar
10.5120/20088-2031

Roshni Rajavat, Bhavna Gala, Asmita Redekar . Textual and Graphical Password Authentication Scheme Resistant to Shoulder Surfing. International Journal of Computer Applications. 114, 19 ( March 2015), 26-30. DOI=10.5120/20088-2031

@article{ 10.5120/20088-2031,
author = { Roshni Rajavat, Bhavna Gala, Asmita Redekar },
title = { Textual and Graphical Password Authentication Scheme Resistant to Shoulder Surfing },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 114 },
number = { 19 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 26-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume114/number19/20088-2031/ },
doi = { 10.5120/20088-2031 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:53:19.305755+05:30
%A Roshni Rajavat
%A Bhavna Gala
%A Asmita Redekar
%T Textual and Graphical Password Authentication Scheme Resistant to Shoulder Surfing
%J International Journal of Computer Applications
%@ 0975-8887
%V 114
%N 19
%P 26-30
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Authentication is a process that ensures a user's identity. User's identity can be verified by user name and password. The textual passwords are the most widely used passwords for authentication. There is a common trend among users to choose short length passwords which are easy to memorize. However, textual passwords are vulnerable to various attacks that include shoulder-surfing, brute force attack, hidden camera and spyware attacks. So to overcome the issues related to textual passwords we propose an authentication scheme called Textual Graphical Password Authentication Scheme Resistant to Shoulder Surfing. This scheme combines both text as well as graphics which are capable of resisting shoulder surfing, brute force attack, hidden camera and spyware attack. The specialty of Textual Graphical Password Authentication Scheme Resistant to Shoulder Surfing is its user friendliness which allows the user to migrate from the current authentication scheme to our proposed scheme.

References
  1. A. Adams and M. A. Sasse, "Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures", Communications of the ACM, 42:41–46, 1999.
  2. R. N. Shepard, "Recognition memory for words, sentences and pictures", Journal of Verbal Learning and Verbal Behavior, 6:156–163, 1967.
  3. G. E. Blonder, "Graphical passwords", United States Patent 5559961, 1996.
  4. S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "Authentication using graphical passwords: Basic results", in Human-Computer Interaction International (HCII 2005), Las Vegas, NV, 2005.
  5. S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "Authentication using graphical passwords: Effects of tolerance and image choice", in Symposium on Usable Privacy and Security (SOUPS), Carnegie Mellon University, Pittsburgh, 2005.
  6. R. U. Corporation, "How the pass face system works", 2005.
  7. I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, "In proceedings of the design and analysis of graphical passwords", in the 8th USENIX Security Symposium, 1999.
  8. A. P. Sabzevar, A. Stavrou, "Universal Multi-factor authentication using graphical passwords," in: IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008, SITIS ?08, Nov. 30 2008–Dec. 3 2008, pp. 625–632.
  9. D. Nali and J. Thorpe, "Analyzing user choice in graphical passwords", in Technical Report, School of Information Technology and Engineering, University of Ottawa, Canada, May 27 2004.
  10. J. Thorpe and P. C. v. Oorschot, "Graphical dictionaries and the memorable space of graphical passwords", in Proceedings of the 13th USENIX Security Symposium, San Deigo, CA, 2004.
  11. Haichang Gao, Xiyang Liu, Sidong Wang, Honggang Liu, Ruyi Dai, "Design and analysis of a graphical password scheme," 2009 Fourth International Conference on Innovative Computing, Information and Control, ICICIC, 7–9 Dec. 2009, pp. 675–678.
  12. A. P. Sabzevar, A. Stavrou, "Universal Multi-factor authentication using graphical passwords," in: IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008, SITIS 08, Nov. 30 2008–Dec. 3 2008, pp. 625–632.
  13. D. Hong, S. Man, B. Hawes, and M. Mathews, "A password scheme strongly resistant to spyware", in Proceedings of International conference on security and management, Las Vergas, NV, 2002.
  14. S. Man, D. Hong, and M. Mathews, "A shoulder sur?ng resistant graphical password scheme", in Proceedings of International conference on security and management, Las Vegas, NV, 2003.
  15. Huanyu Zhao and Xiaolin Li, " S3PAS:A Scalable Shoulder-Surfing Textual- Graphical Password Authentication Scheme", in Scalable Software Systems Laboratory, Department of Computer Science, Oklahoma State University, Stillwater, OK, USA, May 21 2007.
  16. R. N. Shepard, "Recognition memory for words, sentences and pictures", Journal of Verbal Learning and Verbal Behavior, 6:156–163, 1967.
Index Terms

Computer Science
Information Sciences

Keywords

Hacking brute force attack graphical password and authorization.