CFP last date
22 April 2024
Reseach Article

Image based Authentication System

Published on October 2013 by Pintu R Shah
International Conference on Communication Technology
Foundation of Computer Science USA
ICCT - Number 4
October 2013
Authors: Pintu R Shah
d92b4d9c-152f-4a88-922b-36f5f2cd0010

Pintu R Shah . Image based Authentication System. International Conference on Communication Technology. ICCT, 4 (October 2013), 1-4.

@article{
author = { Pintu R Shah },
title = { Image based Authentication System },
journal = { International Conference on Communication Technology },
issue_date = { October 2013 },
volume = { ICCT },
number = { 4 },
month = { October },
year = { 2013 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/icct/number4/13666-1331/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Communication Technology
%A Pintu R Shah
%T Image based Authentication System
%J International Conference on Communication Technology
%@ 0975-8887
%V ICCT
%N 4
%P 1-4
%D 2013
%I International Journal of Computer Applications
Abstract

Username and password are the most commonly used mechanism for authentication because of simplicity and convenience. However it suffers from few drawbacks like selection of weak passwords by the users, users disclosing their passwords etc. This weakens the security posture of the organizations. Hence we propose a new image based authentication system. Research suggests that use of images may be more effective in terms of security and ease of use for some application. This is because we, humans are good at recognizing images than remembering password. In this paper we describe new image based authentication system which can be used independently or along with current character based authentication system to improve security and usability. We implemented the said system along with current authentication system (username and password). We carried out the user survey. Around seventy users including students and faculty tested the system and gave their feedback. After analysis, One of the key outcome is that 97% were able to register with the system and 94% we able to successfully authenticate with the system. Results of the user feedback are presented and discussed in this paper.

References
  1. M. Bishop, S. S. Venkatramanayya, "Introduction to Computer Security", Pearson Education, 2009
  2. Shraddha D. Ghogare, Swati P. Jadhav, Ankita R. Chadha, Hima C. Patil, "Location Based Authentication: A New Approach towards Providing Security", International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012. ISSN 2250-3153
  3. Sharma, Seema, "Location Based Authentication" (2005). University of New Orleans Theses and Dissertations. Paper 141. [Online]. Available : http://scholarworks. uno. edu/cgi/viewcontent. cgi?article=1145&context=td
  4. J. Brainard, A. Juels, R. Rivest, M. Szydlo, M. Yung, "Fourth Factor Authentication: Somebody you know", ACM'06. [Online]. Available: http://www. rsasecurity. ca/rsalabs/staff/bios/ajuels/publications/fourth-factor/ccs084-juels. pdf
  5. (2013) Imperva Site [Online]. Available: http://www. imperva. com/docs/wp_consumer_password_worst_practices. pdf
  6. M. Whitman, H. Mattford, " Principles of Information Security",2nd Ed. Cengage Learning,2009
  7. I. Rock and P. Engelstein, "A study of Memory for Visual Form",[Online]. Available: http://www. jstor. org/stable/1419366
  8. L. Standing," Learning 10,000 Pictures",[online]. Available: http://cvcl. mit. edu/SUNSeminar/standing73. pdf
  9. G. Danezis and A. Serjantov, " Statistical Disclosure or Intersection attacks on anonymity systems",[Online]. Available: http://research. microsoft. com/en- us/um/people/gdane/papers/poolsda3. pdf
  10. Rachana Dhamija and Adrian Perrig, "Déjà vu: A user using images for authentication", [online]. Available : https://sparrow. ece. cmu. edu/group/pub/old-pubs/usenix. pdf
  11. Hideki Koike, Tetsuji Takada, Takehito Onuki, "Awase-E: Photo-based User Authentication System", [online]. Available : http://www. netaro. info/~zetaka/publications/papers/awasee-UBICOMP2005. pdf
  12. Hideki Koike and Tetsuji Takada, "Awase-E: Image-based Authentication for Mobile Phones using User's Favorite Images", [online]. Available : http://www. netaro. info/~zetaka/publications/papers/awasee-MobileHCI03. pdf
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Image Based Authentication Graphical Passwords Multi Level Authentication Usable Security Human Computer Interaction.