CFP last date
20 May 2024
Reseach Article

User Authentication using Musical Password

by Naveen Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 59 - Number 9
Year of Publication: 2012
Authors: Naveen Kumar
10.5120/9573-4048

Naveen Kumar . User Authentication using Musical Password. International Journal of Computer Applications. 59, 9 ( December 2012), 1-4. DOI=10.5120/9573-4048

@article{ 10.5120/9573-4048,
author = { Naveen Kumar },
title = { User Authentication using Musical Password },
journal = { International Journal of Computer Applications },
issue_date = { December 2012 },
volume = { 59 },
number = { 9 },
month = { December },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume59/number9/9573-4048/ },
doi = { 10.5120/9573-4048 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:03:41.679892+05:30
%A Naveen Kumar
%T User Authentication using Musical Password
%J International Journal of Computer Applications
%@ 0975-8887
%V 59
%N 9
%P 1-4
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Computers, Mobile and other handheld devices depend largely on passwords mechanism to identify and authenticate users. Typically, passwords are strings of characters and digits. Alphanumeric passwords are convoluted to remember for users because a safe password should be long and arbitrary, however users pick short, simple, and insecure passwords. Different solutions have been proposed to aim to make passwords more memorable and easier for users to use and, for this reason, it is more secure. In this paper, we propose a new user authentication scheme, based on the principle that the music, melody can all aid memory. In this scheme the simulation of Piano instrument is implemented for proof of concept. User creates the music using the keys of Piano simulation, which will be stored as user password in the secure database. Each key selection of piano can be associated with a unique secret code, the combination of these codes are actually stored in the database after hashing, which will be tested at the time of user authentication. The proposed scheme is highly memorable, defiant to brute force attacks and dictionary attack, protected from shoulder surfing attacks and from spywares tracking. This combination of security and usability will be a focus for users to choose this scheme for their web, computer and mobile passwords.

References
  1. Daniel K. , 1990. "Foiling the Cracker: A Survey of, and Improvements to, Password Security," Proceedings of the 2nd USENIX Unix Security Workshop, pp. 5-14.
  2. S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, 2005. "Authentication using graphical passwords: Basic results," Human-Computer Interaction International (HCI 2005). Las Vegas, NV.
  3. Neverman. 1999 The Affects of Music on the Mind. On-line. Internet. 20 December 1999. Available http://www. powell. k12. ky. us/pchs/publications/ Affects_of_Music. html, Last accessed in October 2012.
  4. Boltz, M. , Schulkind, M. , and Kantra, S. , 1991. Effects of background music on the remembering of filmed events. Memory and Cognition, 19 (6), 593-606.
  5. S. Brostoff, and M. A. Sasse, 2000. "Are Passfaces more usable than passwords: a field trial investigation," People and Computers XIV—Usability or Else, Proceedings of HCI, Springer, Berlin, pp. 405–424.
  6. http://www. rsasecurity. com/products/securid/, Last accessed in October 2012.
  7. Kumar Naveen. 2011. Password in Practice: an Usability Survey. Journal of Global Research in Computer Science, Volume 2, No. 5, pp. 107-112, ISSN-2229-371X.
  8. J. Thorpe, and van Oorschot, 2004. "Towards secure design choices for implementing graphical passwords," ACSAC '04: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC'04), Washington, DC, USA, Vol. 3, pp. 664 – 666.
  9. Samson, S. , Zatorre, R. J. 1991 Recognition memory for text and melody of songs after unilateral temporal lobe lesion: evidence for dual encoding. Journal of Experimental Psychology: Learning, Memory, and Cognition. 17(4), 793-804.
  10. Wallace, W. T. , 1994. Memory for Music: Effects of Melody on Recall of Text. Journal of Experimental Psychology: Learning, Memory, and Cognition, 20 (6), 1471-1485.
  11. Chaffin, R. , Imreh, G. 2002. Practicing perfection: piano performance as expert memory. Psychological Science. 13 (4), 342-349.
  12. I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter and A. D. Rubin, 1999 "The design and analysis of graphical passwords," Proceedings of the Eighth USENIX Security Symposium, pp. 1–14.
Index Terms

Computer Science
Information Sciences

Keywords

Security User Authentication usability memorability Password Musical Password