CFP last date
20 May 2024
Reseach Article

Perception based Cued Click Points

by Harsh Kumar Sarohi, Farhat Ullah Khan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 22
Year of Publication: 2013
Authors: Harsh Kumar Sarohi, Farhat Ullah Khan
10.5120/12201-8381

Harsh Kumar Sarohi, Farhat Ullah Khan . Perception based Cued Click Points. International Journal of Computer Applications. 70, 22 ( May 2013), 29-33. DOI=10.5120/12201-8381

@article{ 10.5120/12201-8381,
author = { Harsh Kumar Sarohi, Farhat Ullah Khan },
title = { Perception based Cued Click Points },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 22 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 29-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number22/12201-8381/ },
doi = { 10.5120/12201-8381 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:33:33.987461+05:30
%A Harsh Kumar Sarohi
%A Farhat Ullah Khan
%T Perception based Cued Click Points
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 22
%P 29-33
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Combination of username and password is most commonly used authentication technique. Graphical password facilitate memorability at the same time provide security against various attacks. In Graphical authentication user performs some events on pictures like clicking, dragging, moving mouse etc. Cued Click Point is one of the existing graphical authentication systems. This paper suggests an enhancement to click point based approach. In the proposed method click points will based on user perception of click points not on the basis of traditional technique like tolerance square . A perceptual hash function will be used for comparing click points made at registration time and login time. In the proposed method the click points will be compared based on the content of click points. This method provides more accuracy and security than any other methods available.

References
  1. Jansen, W. Gavrila, S. Korolev, V. Ayers, R. Swanstrom, "Picture Password: A Visual Login Technique for Mobile Devices", NISTt NISTIR 7030, 2003.
  2. Real User Corporation, Passfaces TM http://www. realuser. com, Accessed on January 2007.
  3. D. Davis, F. Monrose and M. K Reiter, "On User Choice in Graphical Password Schemes", In Proceesings of the USENIX Security Symposium, California, 2004.
  4. Sobrado, L and Birget, J. "Graphical Passwords", The Rutgers Scholar, An Electronic Bulletin of Undergraduate Research, Ruthgers University, New Jersey, Vol. 4, 2004.
  5. D. Hong, S. Man, B. Hawes, and M. Mathews, "A password scheme strongly resistant to spyware", In Proceedings of International conference on security and management, Las Vergas, NV, 2004.
  6. R. Dhamija and A. Perrig. "Déjà vu: A User Study Using Images for Authentication", In Proceedings of the USENIX Security Symposium, 2000.
  7. I. Jermyn, A. Mayer, F. Monrose. M. K. Reiter and A. D. Rubin, "The Design and Analysis of GraphicalPasswords", In Proceedings of the 8th USENIX Security Symposium, 1999.
  8. G. Blonder, "Graphical Password", In Lucent Technologies, Inc. , Murray Hill, NJ,United States Patent 5559961, 1996.
  9. SFR IT -Engineering, http://www. sfr-software. de/cms/EN/pocketpc/viskey/, Accessed on January 2007.
  10. Passlogix, http://www. passlogix. com, Accessed on February 2007.
  11. ] S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "Authentication Using Graphical Passwords: Basic Results", In Human-Computer Interaction International (HCII 2005), Las Vegas, NV, 2005.
  12. S. Wiedenbeck, S. , Waters, J. , Birget, J. C. , Brodskiy, A. , Memon, N. , "PassPoints: Design and Longitudinal Evaluation of a Graphical Password System", International Journal of Human-Computer Studies, 63, 2005, pp. 102-127.
Index Terms

Computer Science
Information Sciences

Keywords

Graphical Password Authentication Graphical Authentication based on Perceptual hashing Cued Click Point Perception based CCP Picture Password Graphical User Authentication