CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Shoulder Surfing Resistant Text-based Graphical Password Scheme

Published on September 2015 by Sumit H. Wagh, Aarti G. Ambekar
CAE Proceedings on International Conference on Communication Technology
Foundation of Computer Science USA
ICCT2015 - Number 3
September 2015
Authors: Sumit H. Wagh, Aarti G. Ambekar
a79cc462-2c37-4bef-bbd6-60bd11044ce9

Sumit H. Wagh, Aarti G. Ambekar . Shoulder Surfing Resistant Text-based Graphical Password Scheme. CAE Proceedings on International Conference on Communication Technology. ICCT2015, 3 (September 2015), 17-19.

@article{
author = { Sumit H. Wagh, Aarti G. Ambekar },
title = { Shoulder Surfing Resistant Text-based Graphical Password Scheme },
journal = { CAE Proceedings on International Conference on Communication Technology },
issue_date = { September 2015 },
volume = { ICCT2015 },
number = { 3 },
month = { September },
year = { 2015 },
issn = 0975-8887,
pages = { 17-19 },
numpages = 3,
url = { /proceedings/icct2015/number3/22649-1550/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 CAE Proceedings on International Conference on Communication Technology
%A Sumit H. Wagh
%A Aarti G. Ambekar
%T Shoulder Surfing Resistant Text-based Graphical Password Scheme
%J CAE Proceedings on International Conference on Communication Technology
%@ 0975-8887
%V ICCT2015
%N 3
%P 17-19
%D 2015
%I International Journal of Computer Applications
Abstract

Many authentications schemes are presented, but users are familiar with textual password schemes. Textual password schemes are vulnerable to shoulder surfing andkeyloggers. To overcome this problem many other authentication systems like token based authentication, biometric based authentication systems, graphical password schemes have been proposed. However biometric based authentication systems are costly and graphical password systems are not that secure and efficient. In this paper, an improved text-based graphical password scheme by using sectors is proposed, which is shoulder surfing as well as keylogger resistant.

References
  1. L. Sobrado and J. C. Birget, "Graphical passwords," The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research, vol. 4, 2002.
  2. L. Sobrado and J. C. Birget,"Shoulder-surfing resistant graphical passwords," Draft, 2005.
  3. S. Wiedenbeck, J. Waters, L. ,Sobrado, and J. C. Birget, "Design and evaluation of a shoulder-surfing resistant graphical password scheme," Proc. of Working Conf. or Advanced VisualInterfaces, May. 2006, pp. 177-184.
  4. T. Yamamoto, Y. Kojima, and M. ,Nishigaki"Ashouldersurfing resistant image-based authenticationsystem with temporal indirect imageselection," Proc. of the 2009 Int. Conf. on Security and Management,July 2009,pp. 188- 194.
  5. G. E. Blonder. Graphical passwords. United States Patent 5559961, 1996.
  6. R. U. Corporation. How the passface system works, 2005
  7. H. Zhao and X. Li, " S3PAS: Ascalable shoulder-surfing resistant textual-graphicalpasswordauthentication scheme," Proc. of 21st Int. Conf. on AdvancedInformationNetworking and ApplicationWorkshops, vol. 2, May2007, pp. 467-472.
  8. M. Sreelatha, M. Shashi, M. Anirudh, Md. Sultan Ahamer, and V. ManojKumar. "Authenticationschemes for session passwords using color and images," International Journal of NetworkSecurity& Its Application, vol. 3, no. 3, May 2011
  9. B. Hartanto, B. Santoso, and S. Welly, " The usage of graphical password as a replacement to thealphanumerical password,"Informatika, vol. 7, no 2, 2006, pp. 91-97.
  10. S. Man,D. Hong, and M. Mathews," A shoulder surfing resistant graphical password scheme," Proc. of the 2003 Int. Conf. on Security and Management, June 2003
  11. T. Perkovic,M . Cagalj, and N. Rakic,"SSSL: shoulder surfing safe login, " Proc. of the 17th Int. Conf. On Software, Telecommunications &Computer Networks, Sept. 2009
  12. Z. Zheng, X. Liu, L. Yin, and Z. Liu, "A stroke-based textual password authentication scheme, "Proc. Of the First Int. Workshop on Education Technology and Computer Science, Mar. 2009,pp. 90- 95.
  13. B. R. Cheng, W. C. Ku, and W. P Chen, "An efficient login-recording attack resistant of graphical password scheme ?SectorLogin,"
  14. Proc. of 2010 Conf . on Innovative Applications Information Security Technology, Dec. 2010
Index Terms

Computer Science
Information Sciences

Keywords

Shoulder Surfing Graphical Password Key Logger Sector Base Authentication