![]() |
10.5120/15184-3535 |
A Abuthaheer, Jeya N S Karthikka and T M Thiyagu. Article: Cued Click Points Graphical Images and Text Password along with Pixel based OTP Authentication. International Journal of Computer Applications 87(2):45-49, February 2014. Full text available. BibTeX
@article{key:article, author = {A. Abuthaheer and N. S. Jeya Karthikka and T. M. Thiyagu}, title = {Article: Cued Click Points Graphical Images and Text Password along with Pixel based OTP Authentication}, journal = {International Journal of Computer Applications}, year = {2014}, volume = {87}, number = {2}, pages = {45-49}, month = {February}, note = {Full text available} }
Abstract
A graphical password uses images or representation of images as passwords. Human brain is easily remembering the Graphical image secret word compare to Text secret word. There are dissimilar graphical image secret word methods or graphical image secret word software's are available in the market. The proposed work merges Cued click points, text and token based verification. The main objective of this proposal is to reduce the guessing attacks as well as encouraging users to select more random, and difficult to guess password. Well known security threats like brute force attacks and dictionary attacks can be successfully abolished using this method.
References
- Sonia Chiasson, Elizabeth Stobert, Alain Forget, Robert Biddle, and Paul C. van Oorschot, 2012," Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism," to be published in IEEE Transactions, vol. 9, no. 2.
- Biddle R, Chiasson S, and van Oorschot P,2012, "Graphical Passwords: Learning from the First Twelve Years," to be published in ACM Computing Surveys, vol. 44, no. 4.
- Chiasson S, Biddle R, and van Oorschot P,2007, "A Second Look at the Usability of Click-Based Graphical Passwords," Proc. ACM Symp. Usable Privacy and Security (SOUPS).
- Chiasson S, van Oorschot P, and Biddle R,2007, "Graphical Password Authentication Using Cued Click Points," Proc. European Symp. Research in Computer Security (ESORICS), pp. 359-374.
- Chiasson S, Forget A, Biddle R, and van Oorschot P,2008 ,"Influencing Users towards Better Passwords: Persuasive Cued Click-Points," Proc. British HCI Group Ann. Conf. People and Computers: Culture, Creativity, Interaction.
- Chiasson S, Forget A, Stobert E, van Oorschot P, and Biddle R, 2009,"Multiple Password Interference in Text and Click-Based Graphical Passwords," Proc. ACM Conf. Computer and Comm. Security (CCS).
- Chiasson S, Forget A, Biddle R, and van Oorschot P. C,2009, "User Interface Design Affects Security: Patterns in Click-Based Graphical Passwords," Int'l J. Information Security, vol. 8, no. 6, pp. 387- 398.
- Jain A, Ross A, and Pankanti S,2006, "Biometrics: A Tool for Information Security," IEEE Trans. Information Forensics and Security (TIFS), vol. 1, no. 2, pp. 125-143.
- O'Gorman L, 2003,"Comparing Passwords, Tokens, and Biometrics for User Authentication," Proc. IEEE, vol. 91, no. 12, pp. 2019-2020.
- Stobert E, Forget A, Chiasson S, van Oorschot P, and Biddle R,2010, "Exploring Usability Effects of Increasing Security in Click-Based Graphical Passwords," Proc. Ann. Computer Security Applications Conf. (ACSAC).