CFP last date
20 May 2024
Reseach Article

The Recognition and Recall Approach based Graphical Password Technique

Published on August 2016 by Aakansha Gokhale, Vijaya Waghmare
International Conference on Communication Computing and Virtualization
Foundation of Computer Science USA
ICCCV2016 - Number 2
August 2016
Authors: Aakansha Gokhale, Vijaya Waghmare
1b9f4bdf-f6cf-44d9-adda-1ce4af759ebb

Aakansha Gokhale, Vijaya Waghmare . The Recognition and Recall Approach based Graphical Password Technique. International Conference on Communication Computing and Virtualization. ICCCV2016, 2 (August 2016), 24-27.

@article{
author = { Aakansha Gokhale, Vijaya Waghmare },
title = { The Recognition and Recall Approach based Graphical Password Technique },
journal = { International Conference on Communication Computing and Virtualization },
issue_date = { August 2016 },
volume = { ICCCV2016 },
number = { 2 },
month = { August },
year = { 2016 },
issn = 0975-8887,
pages = { 24-27 },
numpages = 4,
url = { /proceedings/icccv2016/number2/25604-0179/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Communication Computing and Virtualization
%A Aakansha Gokhale
%A Vijaya Waghmare
%T The Recognition and Recall Approach based Graphical Password Technique
%J International Conference on Communication Computing and Virtualization
%@ 0975-8887
%V ICCCV2016
%N 2
%P 24-27
%D 2016
%I International Journal of Computer Applications
Abstract

Today Information Technology has become a part of our everyday life. Information Technology means use of computers and internet to store, retrieve, transmit and manipulate the information. So all the organizations, industries and also every individual are using computers to store and share/communicate the information. So here security is very much important while storing and communicating the information. Security means protecting computers, networks, programs and information from unintended or unauthorized access, change or destruction. For this security various techniques are available. Among them the most common and easy to use is a password. It can be considered as a principal part of authentication process. The traditional password technique is a textual password. But there are various deficiencies in this password. It is vulnerable to various attacks. So to overcome these limitations alternative technique is introduced which is graphical password. As name indicates, in this, various images/pictures are used as a password. But it is observed that because of graphic nature nearly all the graphical passwords are vulnerable to shoulder surfing attack. To overcome this here a new graphical password authentication technique is developed which is a combination of recognition and recall approach based techniques. It is also resistant to other types of attacks to some extent. It can be useful for smart phones, PDA, iPod, iPhone etc.

References
  1. XiaoyuanSuo, Ying Zhu, G. Scott. Owen, "Graphical Passwords: A Survey", Department of Computer Science Georgia State University.
  2. Kirkpatrick. "An experimental study of memory". PsychologicalReview, 1:602-609, 1894.
  3. S. Madigan. "Picture memory". In J. Yuille, editor, Imagery, Memory, and Cognition: Essays in Honor of Allan Paivio, chapter 3, pp. 65-89. Lawrence Erlbaum Associates, 1983.
  4. A. Paivio, T. Rogers, and P. C. Smythe. "Why are pictures easier to recall than words?" Psychonomic Science, 11(4):137-138, 1968.
  5. R. Shepard. "Recognition memory for words, sentences, and pictures". Journal of Verbal Learning and Verbal Behavior, 6:156-163, 1967.
  6. R. Dhamija and A. Perrig, "Deja Vu: A User Study Using Images for Authentication," in Proceedings of 9 USENIX Security Symposiums, 2000.
  7. Real User Corporation, "How the Passface System Works", 2005.
  8. Christopher Varenhorst" Passdoodles; a Lightweight Authentication Method ", Massachusetts Institute of Technology, Research Science Institute, July 27, 2004.
  9. A. F. Syukri, E. Okamoto, and M. Mambo, "A User Identification System Using Signature Written withMouse," in Third Australasian Conference on Information Security and Privacy (ACISP): Springer-Verlag Lecture Notes in Computer Science (1438), 1998, pp. 403-441.
  10. G. E. Blonder. Graphical passwords. United States Patent5559961, 1996.
  11. Susan Wiedenbeck, Jim Waters, Jean- Camille Birget and Alex Brodskiy, NasirMemon. PassPoints,"Design and longitudinal evaluation of a graphical password system", International Journal of Human-Computer Studies, 63(1-2): 102-127, July 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Graphical Password Shoulder Surfing Textual Password