CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Graphic-Text Authentication of a Window-Based Application

by Ayannuga Olanrewaju O., Folorunso Olusegun
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 21 - Number 6
Year of Publication: 2011
Authors: Ayannuga Olanrewaju O., Folorunso Olusegun
10.5120/2514-3411

Ayannuga Olanrewaju O., Folorunso Olusegun . Graphic-Text Authentication of a Window-Based Application. International Journal of Computer Applications. 21, 6 ( May 2011), 36-42. DOI=10.5120/2514-3411

@article{ 10.5120/2514-3411,
author = { Ayannuga Olanrewaju O., Folorunso Olusegun },
title = { Graphic-Text Authentication of a Window-Based Application },
journal = { International Journal of Computer Applications },
issue_date = { May 2011 },
volume = { 21 },
number = { 6 },
month = { May },
year = { 2011 },
issn = { 0975-8887 },
pages = { 36-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume21/number6/2514-3411/ },
doi = { 10.5120/2514-3411 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:07:50.341432+05:30
%A Ayannuga Olanrewaju O.
%A Folorunso Olusegun
%T Graphic-Text Authentication of a Window-Based Application
%J International Journal of Computer Applications
%@ 0975-8887
%V 21
%N 6
%P 36-42
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Password systems have fallen under several attacks in the last decade. Shoulder surfing, key logging, brute force attack and many others have been identified as threats for the security of systems. The conventional (traditional text passwords) are often forgotten by users. In view of this, users often write them down on sheet of paper or any other surface for memorability. Users tend to choose short and simple passwords in place of long and complex passwords. Graphical passwords have been introduced as an alternative to text passwords. This is because humans tend to remember visuals better than text. This paper attempt to highlight the existing graphical password schemes noting their strength and weaknesses, their usability features and then develop a new graphical password system that combines both graphic and texts passwords to fortify the authentication process on desktop systems.

References
  1. Perrig and D. Song, "Hash Visualization: A New Technique to Improve Real- world Security," in Proceedings of the 1999 International Workshop on Cryptography Techniques and E-Commerce, 1999.
  2. F. Syukri, E. Okamoto, and M. Mambo, "A User Identification System Using Signature Written with Mouse," in Third Australasian Conference on Information Security and Privacy (ACISP): Springer-Verlag Lecture Notes in Computer Science (1438), 1998, pp. 403-441.
  3. Ali Mohamed Eljetlawi, Norafida Ithnin. “Graphical password: comprehensive study of the usability features of the recognition base graphical password methods,” Third 2008 International Conference on Convergence and Hybrid Information Technology. 1137-1143. 2008
  4. Brostoff, S. and Sasse, M.A. Are Passfaces more usable than passwords: A field trial investigation. In People and Computers XIV - Usability or Else: Proceedings of HCI 2000 (Bath, U.K., Sept. 8-12, 2000). Springer Verlag, 405-424.
  5. Brown, A.S., Bracken, E., Zoccoli, S. and Douglas, K. Generating and remembering passwords. Applied Cognitive Psychology 18 (2004), 641-651.
  6. Berger, M.A., (2003), “Password Security is a Must for Any Organisation”, Computers in Libraries 23(5), May2003, p41.6- Coventry, L., De Angeli, A. and Johnson, G. Usability and biometric verification at the ATM interface. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’03) (Fort Lauderdale, FL, USA, April 5-10, 2003). ACM Press, New York, NY, 153-160.
  7. Bailey, R. 2001. How reliable is usability performance testing? UI design update
  8. newsletter.http://www.webusability.com/article_reliability_of_usability_testing_10-2001.htm [14 Jan 2008].
  9. Dourish, P. Security as experience and practice: Supporting everyday security. Talk given at the DIMACS Workshop on Usable Privacy and Security Software, July 7, 2004.
  10. Dhamija, R. and Perrig, A. Déjà Vu: User study using images for authentication. In
  11. Ninth Usenix Security Symposium (Denver, CO, USA, Aug. 14-17, 2000).
  12. http://www.usenix.org/publications/library/proceedings/sec2000/dhamija.html, accessed: Feb. 20, 2005.
  13. D. Davis, F. Monrose, and M. K. Reiter, "On user choice in graphical password
  14. schemes," in Proceedings of the 13th Usenix Security Symposium. San Diego, CA, 2004.
  15. Feldmeier, D.C. and Karn, P.R. UNIX password security – ten years later. In Advances in Cryptology – CRYPTO’89, Lecture Notes in Computer Science 435, Springer Verlag (1990), 44-63.
  16. Faulkner, L. 2003. Beyond the five-user assumption: Benefits of increased sample sizes in usability testing. Behaviour Research Methods, Instruments, & Computers, 35(3), pp. 379-383.
  17. G. E. Blonder, "Graphical passwords," in Lucent Technologies, Inc., Murray Hill,
  18. NJ, U. S. Patent, Ed. United States, 1996.
  19. Google (2007) http://www.usabilitypartners.se/usability/what.shtml.
  20. Google (2007) http://www.usabilitypartners.se/usability/standards.shtml
  21. Google(2007) http://www.baychi.org/calendar/files/ISO-Standards-for- Usability/ISO- Standards-for-Usability.pdf
  22. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, "The Design and Analysis of Graphical Passwords," in Proceedings of the 8th USENIX Security Symposium, 1999.
  23. Jain, A., Hong, L. and Pankanti, S. Biometric identification. CACM 43, 2 (2000), 91- 98 28- J. Goldberg, J. Hagman, and V. Sazawal, "Doodling Our Way to Better Authentication," presented at Proceedings of Human Factors in Computing
  24. Systems (CHI), Minneapolis, Minnesota, USA., 2002.
  25. J.-C. Birget, D. Hong, and N. Memon, "Robust discretization, with an application to graphical passwords," Cryptology ePrint archive 2003.
  26. L. Sobrado and J.-C. Birget, "Graphical passwords," The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research, vol. 4, 2002.
  27. R. Dhamija and A. Perrig, "Deja Vu: A User Study Using Images for Authentication," in Proceedings of 9th USENIX Security Symposium, 2000.
  28. R. N. Shepard, "Recognition memory for words, sentences, and pictures," Journal of Verbal Learning and Verbal Behavior, vol. 6, pp. 156-163, 1967.
  29. Sasse, M.A., Brostoff, S. and Weirich, D. Transforming the ‘weakest link’– a human/computer interaction approach to usable and effective security. BT Technical Journal 19 (2001), 122-131.
  30. S. Man, D. Hong, and M. Mathews, "A shoulder-surfing resistant graphical password scheme," in Proceedings of International conference on security and management. Las Vegas, NV, 2003.
  31. T. Takada and H. Koike, "Awase-E: Image-based Authentication for Mobile Phones using User’s Favorite Images," in Human-Computer Interaction with Mobile Devices and Services, vol. 2795 / 2003: Springer-Verlag GmbH, 2003, pp. pp. 347 - 351.
Index Terms

Computer Science
Information Sciences

Keywords

Brute force Key logging Password Shoulder surfing