Call for Paper - November 2022 Edition
IJCA solicits original research papers for the November 2022 Edition. Last date of manuscript submission is October 20, 2022. Read More

Graphical Password Authentication using a Fake Cursor Approach

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Pratik P. Jog, Archana B. Patankar
10.5120/ijca2016911298

Pratik P Jog and Archana B Patankar. Graphical Password Authentication using a Fake Cursor Approach. International Journal of Computer Applications 148(11):35-40, August 2016. BibTeX

@article{10.5120/ijca2016911298,
	author = {Pratik P. Jog and Archana B. Patankar},
	title = {Graphical Password Authentication using a Fake Cursor Approach},
	journal = {International Journal of Computer Applications},
	issue_date = {August 2016},
	volume = {148},
	number = {11},
	month = {Aug},
	year = {2016},
	issn = {0975-8887},
	pages = {35-40},
	numpages = {6},
	url = {http://www.ijcaonline.org/archives/volume148/number11/25804-2016911298},
	doi = {10.5120/ijca2016911298},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

This paper presents a novel method for solving the shoulder surfing problem commonly found in the graphical password authentication system. Authentication of a user is the critical aspect required to gain access to secure and confidential data. Most of the current systems are using alphanumeric password for authentication purpose, however alphanumeric passwords have some disadvantages for example in terms of memorability. So a substitute to alphanumeric passwords, graphical passwords have been recommended. Graphical passwords have been planned to make passwords more unforgettable and effortless for the people to use. During a graphical password authentication, end users click on particular points on images rather than submitting alphanumeric characters. Graphical password schemes can be grouped into two general categories based on the type of cognitive activity required to remember the specific password: recognition and recall. Recognition is the easiest for human memory where on the other hand pure recall is most difficult since the information must be accessed from memory with no triggers. This paper focuses on Cued recall which falls somewhere between these two as it offers a cue which must establish a context and trigger the stored memory. Graphical passwords generally suffer from shoulder surfing problem. The problem of shoulder surfing is solved using a fake cursor approach. This is a new approach in which two cursors are displayed during the login phase and only the authorized user is aware which is the original cursor and which one is the fake cursor.

References

  1. Saurabh Singh and Gaurav Agarwal, Integration of Sound Signature in Graphical Password Authentication System, International Journal of Computer Applications (0975 – 8887) Volume 12– No.9, January 2011.
  2. Dr.C.Kumar, Overcome Password Hacking through Graphical Password Authentication, International Journal on Engineering Technology and Sciences – IJETS™ ISSN (P): 2349-3968, ISSN (O): 2349-3976 Volume 2 Issue 2, February 2015.
  3. Vaibhav Moraskar et al. Cued Click Point Technique for Graphical Password Authentication, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.1, January- 2014, pg. 166-172.
  4. Devi Srinivas and M.L.Prasanthi, Implementation of Knowledge Based Authentication System Using Persuasive
  5. Cued Click Points, IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727 Volume 12, Issue 2 (May. - Jun. 2013), PP 39-46.
  6. Smita Chaturvedi et al, Securing Image Password by using Persuasive Cued Click Points with AES Algorithm, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4), 2014, 5210-5215.
  7. Ankita R Karia et al, Image Based Authentication Using Persuasive Cued Click Points Int. Journal of Engineering Research and Applications ISSN: 2248-9622, Vol. 4, Issue 5(Version 6), May 2014, pp.179-185.
  8. Sunil et al, Cued Click Points: Graphical Password Authentication Technique for Security / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2), 2014, 1073-1075.
  9. Anu Singh et al, Graphical Password Authentication System with Integrated Sound Signature, International Journal of Computational Engineering Research||Vol, 03||Issue, 4||, pg 230-234.
  10. Iranna A M, Graphical Password Authentication using Persuasive Cued Click Point, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol. 2, Issue 7, July 2013, ISSN (Print) : 2320 – 3765.
  11. Sonia Chiasson, P.C van Oorschot and Robert Biddle, “Graphical Password Authentication Using Cued Click Points,” Springer-Verlag Berlin Heidelberg, LNCS 4734, p.359-374, 2007.
  12. Smita Chaturvedi et al, Securing Text & Image Password Using the Combinations of Persuasive Cued Click Points with Improved Advanced Encryption, Procedia Computer Science 45(2015) 418-427.
  13. Lavanya Reddy L, Enhanced Cued Click Point Method for Graphical Password Authentication, International Journal of Advanced Research in Computer Science and Software Engineering Volume 3 Issue 8 August 2013.
  14. Ms. Aarti Thakur et al, Integration of Sound Signature with Captcha as a Graphical Password , IJSRD - International Journal for Scientific Research & Development | Sp. Issue – Computer Networking | ISSN (online): 2321 – 0613.
  15. Roshni Rajavat et al, Textual and Graphical Password Authentication Scheme Resistant to Shoulder Surfing, International Journal of Computer Applications (0975 – 8887) Volume 114 – No. 19, March 2015.
  16. G. Agarwal et al, Security Analysis of Graphical Passwords over the Alphanumeric Passwords, International Journal of Pure and Applied Sciences and Technology.

Keywords

Fake cursor, Graphical Password, Security, Authentication