CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Comparison of Graphical Password Authentication Techniques

by Arti Bhanushali, Bhavika Mange, Harshika Vyas, Hetal Bhanushali, Poonam Bhogle
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 116 - Number 1
Year of Publication: 2015
Authors: Arti Bhanushali, Bhavika Mange, Harshika Vyas, Hetal Bhanushali, Poonam Bhogle
10.5120/20299-2332

Arti Bhanushali, Bhavika Mange, Harshika Vyas, Hetal Bhanushali, Poonam Bhogle . Comparison of Graphical Password Authentication Techniques. International Journal of Computer Applications. 116, 1 ( April 2015), 11-14. DOI=10.5120/20299-2332

@article{ 10.5120/20299-2332,
author = { Arti Bhanushali, Bhavika Mange, Harshika Vyas, Hetal Bhanushali, Poonam Bhogle },
title = { Comparison of Graphical Password Authentication Techniques },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 116 },
number = { 1 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 11-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume116/number1/20299-2332/ },
doi = { 10.5120/20299-2332 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:55:52.623268+05:30
%A Arti Bhanushali
%A Bhavika Mange
%A Harshika Vyas
%A Hetal Bhanushali
%A Poonam Bhogle
%T Comparison of Graphical Password Authentication Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 116
%N 1
%P 11-14
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

User Authentication is the most crucial aspect of cyber security. To prevent systems from various types of attacks, password protection to the system is usually provided. The most widely used authentication method using normal text passwords which contains a sequence of alphabets, numbers, and special characters). User mostly tends to choose text passwords which are easy for them to remember (eg. Their birthdate, phone number, etc). . . However, even though the technique is user friendly, it is susceptible to many attacks. The other type of Authentication scheme is using Graphical Passwords. These passwords contain images which are easier for humans to remember than the long stream of characters in text passwords. The paper discusses various approaches of using graphical passwords . The basic algorithms of graphical passwords are being compared based on security and usability parameters.

References
  1. Blonder, G. E. Graphical Passwords, Murray Hill, NJ, US Patent, 1996
  2. Rachna Dhamija, Adrian Perrig; 2000, "Déjà Vu: A User Study. Using Images for Authentication", in the proceeding of the 9th USENIX security Symposium.
  3. Rachna Dhamija; 2000, "Hash visualization in user authentication", Proceedings of CHI 2000 ACM, The Hague, the Netherlands.
  4. Susan Wiedenbeck, Jim Watersa, Jean-Camille Birgetb, Alex Brodskiyc, NasirMemon; 2005a, "Design and longitudinal evaluation of a graphical password system", Academic Press, Inc. 102-127
  5. Toomaj Zangooei, Masood Mansoori, IanWelch;"A Hybrid Recognition and Recall Based Approach in Graphical Passwords"; OZCHI'12 Proceedings of the 24th Australian Computer Human Interaction Conference ACM New York
  6. Umar, M. S. ; Rafiq M. Q. Ansari J. A. ,"Graphical user authentication: A time interval based approach"; Signal Processing Computing and Control(ISPCC),2012 IEEE International Conferencettsburgh, Pennsylvania, USA, ACM
  7. Umar, M. S. ; Rafiq M. Q. ;"Select-to-Spawn: A Novel Recognition based graphical user authantication skim"; Signal Processing Computing and Control (ISPCC), 2012 IEEE International Conference
  8. X. Suo, Y. Zhu, and G. S. Owen, "Graphical Passwords: A Survey", in Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), IEEE Computer Society, pp. 463-472, 2005.
  9. Arah Habib Lashkari. "A new algorithm for graphical user authentication based on rotation and resizing"
  10. Jermyn Ian, A. Mayer, F. Monrose, M. K. Reiter, A. D. Rubin; 1999, "The design and analysis of graphical passwords", Proceedings of the Eighth USENIX Security Symposium, USENIX Association 1–14.
  11. J. Thorpe and P. C. v. Oorschot, "Towards Secure Design Choices for Implementing Graphical Passwords," in 20th Annual Computer Security Applications Conference (ACSAC) Tueson, USA. IEEE, 2004.
  12. Information Security Principles and Practice by Mark Stamp - Second Edition.
  13. Di Lin, Paul Dunphy, Patrick Olivier, Jeff Yan; 2007, "Graphical Passwords and Qualitative Spatial Relations", Proceedings of the 3rd Symposium on Usable Privacy and security, Pennsylvania, ACM.
  14. Muhammad Daniel Hafiz, Abdul Hanan Abdullah, Norafida Ithnin, Hazinah K. Mammi; 2008, "Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique"; IEEE Explore.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Graphical password Security Attacks Password space Password Entropy Usability