CFP last date
20 June 2024
Reseach Article

Impact of Background Images on the DAS (Draw- A- Secret) Graphical Password Authentication Scheme

Published on December 2011 by Y.D.S. Arya, Gaurav Agarwal
Network Security and Cryptography
Foundation of Computer Science USA
NSC - Number 4
December 2011
Authors: Y.D.S. Arya, Gaurav Agarwal
7460ffa4-fe56-49c4-bcdf-ad9b2d6bc9b0

Y.D.S. Arya, Gaurav Agarwal . Impact of Background Images on the DAS (Draw- A- Secret) Graphical Password Authentication Scheme. Network Security and Cryptography. NSC, 4 (December 2011), 47-50.

@article{
author = { Y.D.S. Arya, Gaurav Agarwal },
title = { Impact of Background Images on the DAS (Draw- A- Secret) Graphical Password Authentication Scheme },
journal = { Network Security and Cryptography },
issue_date = { December 2011 },
volume = { NSC },
number = { 4 },
month = { December },
year = { 2011 },
issn = 0975-8887,
pages = { 47-50 },
numpages = 4,
url = { /specialissues/nsc/number4/4349-spe049t/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Network Security and Cryptography
%A Y.D.S. Arya
%A Gaurav Agarwal
%T Impact of Background Images on the DAS (Draw- A- Secret) Graphical Password Authentication Scheme
%J Network Security and Cryptography
%@ 0975-8887
%V NSC
%N 4
%P 47-50
%D 2011
%I International Journal of Computer Applications
Abstract

The basic idea of Draw- A Secret technique is that a user is asked to draw a simple picture on a 2D grid. The coordinates of the grid, occupied by the picture are stored in the order of the drawing. During authentication, the user is asked to re-draw the picture. If the drawing touches the same grids in the same sequence, then the user is authenticated. But sometimes user fails to recall his/her password during the registration process. In the proposed work we are applying A Background image with das scheme to increase the remembrance of passwords. The basic idea behind the scheme is that the human nature that he or she can recognize pictures easily then the 2 d grids.

References
  1. Graphical Passwords: A Survey Xiaoyuan Suo Ying Zhu G. Scott. Owen Department of Computer Science Georgia State University.
  2. I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A.D. Rubin. The Design and Analysis of Graphical Passwords, Proc. USENIX Security Symposium, 1999
  3. J. Yan, A. Blackwell, R. Anderson and A. Grant. Password Memorability and Security: Empirical Results. IEEE Security & Privacy, Vol. 2 No. 5, 2004.
  4. J. Yan. A Note on Proactive Password Checking. ACM New Security Paradigms Workshop, New Mexico, USA, 2001.
  5. J.Thorpe and P.C. van Oorschot. Towards secure design choices for implementation graphical password, ACSAC.2004, An extended version available at http://www.scs.carleton.ca/ jthrope/extendedStokes.pdf
  6. J. Thorpe and P. C. van Oorschot. Graphical Dictionaries and the Memorable Space of Graphical Passwords. Proc. USENIX Security Symposium, 2004.
  7. S Wiedenbeck, J Waters, JC Birget, A Brodskiy and N Memon. Authentication using graphical passwords: effects of tolerance and image choice. SOUPS’05, CMU, USA. ACM Press.
  8. The grafical login solution for your pocket pc – viskey http://www.sfrsoftware.de/cms/EN/pocketpc/viskey/index.html.
Index Terms

Computer Science
Information Sciences

Keywords

Back ground images Graphical password Draw-a-Secret Authentication