CFP last date
20 May 2024
Reseach Article

A Novel Soft Computing Authentication Scheme for Textual and Graphical Passwords

by P. S. V. Vachaspati, A. S. N. Chakravarthy, P. S. Avadhani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 71 - Number 10
Year of Publication: 2013
Authors: P. S. V. Vachaspati, A. S. N. Chakravarthy, P. S. Avadhani
10.5120/12397-8776

P. S. V. Vachaspati, A. S. N. Chakravarthy, P. S. Avadhani . A Novel Soft Computing Authentication Scheme for Textual and Graphical Passwords. International Journal of Computer Applications. 71, 10 ( June 2013), 41-54. DOI=10.5120/12397-8776

@article{ 10.5120/12397-8776,
author = { P. S. V. Vachaspati, A. S. N. Chakravarthy, P. S. Avadhani },
title = { A Novel Soft Computing Authentication Scheme for Textual and Graphical Passwords },
journal = { International Journal of Computer Applications },
issue_date = { June 2013 },
volume = { 71 },
number = { 10 },
month = { June },
year = { 2013 },
issn = { 0975-8887 },
pages = { 41-54 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume71/number10/12397-8776/ },
doi = { 10.5120/12397-8776 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:35:13.251918+05:30
%A P. S. V. Vachaspati
%A A. S. N. Chakravarthy
%A P. S. Avadhani
%T A Novel Soft Computing Authentication Scheme for Textual and Graphical Passwords
%J International Journal of Computer Applications
%@ 0975-8887
%V 71
%N 10
%P 41-54
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Authentication is the process of identifying an individual, usually based on username and password. Authentication merely ensures that the individual is who he or she claims to be. This forestalls the activities against confidentiality and integrity. Shoulder surfing is the main problem of graphical passwords. To overcome the problem of shoulder surfing we introduced a novel scheme called S3PA (Scalable Shoulder Surfing Resistant Textual-Graphical Password Authentication Scheme) . This S3PA scheme provides the login screen to the user at every time the user logs in, this login image consists of set of characters. User with his password clicks some pass characters which are different for different sessions and explained in proposed scheme. To provide better results Neural Network is used for the authentication.

References
  1. Haichang Gao, Xiyang Liu, Sidong Wang, Honggang Liu, Ruyi Dai, "Design and analysis of a graphical password scheme," 2009 Fourth International Conference on Innovative Computing, Information and Control, ICICIC, 7–9 Dec. 2009, pp. 675–678.
  2. D. Hong, S. Man, B. Hawes, and M. Mathews, "A password scheme strongly resistant to spyware," Proceedings of International conference on security and management. Las Vergas, NV, 2004.
  3. A. P. Sabzevar, A. Stavrou, "Universal Multi-factor authentication using graphical passwords," in: IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008, SITIS '08, Nov. 30 2008–Dec. 3 2008, pp. 625–632.
  4. G. Horng, "Password authentication without using password table," Inform. Processing Lett. , vol. 55, pp. 247–250, 1995.
  5. S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, N. Memon," PassPoints: design and longitudinal evaluation of a graphical password system," International Journal of Human-Computer Studies 63 (2005) 102–127, Special issue on HCI research in privacy and security.
  6. Sadiq Almuairfi, Prakash Veeraraghavan, Naveen Chilamkurti, "A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices," Department of Computer Science and Computer Engineering, La Trobe University, 3086, Melbourne, Australia.
  7. A. Gilbert, "Phishing attacks take a new twist," CNET News. com, May 04,2005.
  8. A. Adams and M. A. Sasse, "Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures," Communications of the ACM,42:41–46, 1999.
  9. L. Sobrado and J. -C. Birget, "Graphical passwords," The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research, vol. 4, 2002.
  10. J. D. Pierce, Jason G. Wells, Matthew J. Warren, David R. Mackay," A conceptual model for graphical authentication,"1st Australian Information security Management Conference, 24 Sept. Perth, Western Australia, November 2003, paper 16.
  11. S. Xiaoyuan, Z. Ying, et al. "Graphical passwords: a survey," 21st Annual Computer Security Applications Conference, 2005, pp. 463–472.
  12. ASN Chakravarthy and Prof. P S Avadhani," A Probabilistic Approach for Authenticating Text or Graphical Passwords Using Back Propagation," IJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 5, May 2011.
  13. Khalil Shihab," A Back propagation Neural Network for Computer Network Security," Journal of Computer Science 2 (9): 710-715, 2006 ISSN 1549-99 © 2006 Science Publications.
  14. Huanyu Zhao and Xiaolin Li ," S3PAS:A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme," 21st International Conference on Advanced Information Networking and Applications Workshops, 2007, IEEE.
  15. R. Dhamija and A. Perrig, "Deja Vu: A User Study Using Images for Authentication," Proceedings of 9th USENIX Security Symposium, 2000.
  16. G. Agarwal and R. S. Shukla," Security Analysis of Graphical Passwords over the Alphanumeric Passwords ", Int. J. Pure Appl. Sci. Technol. , 2010.
  17. J. C. Birget, H. Dawei, et al. , "Graphical passwords based on robust discretization," IEEE Transactions on information Forensics and Security 1 (3) (2006) 395–399.
  18. T. Takada, H. Koike, "Awase-E: image-based authentication for mobile phones using user's favorite images," Human–Computer Interaction with Mobile Devices and Services, vol. 2795, Springer, Berlin / Heidelberg, 2003, pp. 347–351.
  19. K. Renaud," On user involvement in production of images used in visual authentication," Journal of Visual Languages and Computing 20 (I) (2009) 1–15.
  20. D. Weinshall and S. Kirkpatrick, "Passwords You'll Never Forget, but Can't Recall," Proceedings of Conference on Human Factors in Computing Systems (CHI). Vienna, Austria: ACM, 2004, pp. 1399-1402.
  21. A. H. Lashkari, F. Towhidi," A complete comparison on pure and cued recall-based graphical user authentication algorithms," in: Second International Conference on Computer and Electrical Engineering, 2009, ICCEE '09, pp. 527–532.
  22. M. S. Obaidat and D. T. Macchiarolo, "An on-line neural-network system for computer access security," IEEE Trans. Ind. Electron. , vol. 40, pp. 235–242, 1993.
  23. K. Wei-Chi, T. Maw-Jinn, "A remote user authentication scheme using strong graphical passwords", 30th Anniversary IEEE conference on Local Computer Networks, 2005, pp. 351–357.
  24. M Sreelatha,M Shashi,M Anirudh,MD Sultan Ahamer,V Manoj Kumar, "Authentication Schemes for Session Passwords using Color and Images," International Journal of Network Security & Its Applications (IJNSA), Vol. 3, No. 3, May 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Shoulder Surfing Back Propagation Learning Algorithm Feed Forward Neural Network