Graphical password

Top PDF Graphical password:

Integration of Sound Signature in a Graphical Password Authentication System

Integration of Sound Signature in a Graphical Password Authentication System

While the predictability problem can be solved by disallowing user choice and assigning passwords to users, this usually leads to usability issues since users cannot easily remember such random passwords. Number of graphical password systems have been developed, Study shows that text-based passwords suffers with both security and usability problems

5 Read more

Security through CAPTCHA Using Graphical Password

Security through CAPTCHA Using Graphical Password

Existing system allow authentication security to graphical password that has control as username in text format. The knowledge based authentication that measure extraordinarily text based passwords. Users has to produce unforgettable passwords that are truthful for attackers to guess, because the system assigned passwords are difficult for users to recollect, a graphical password authentication system that to encourage users with password that are unforgettable. New concepts like recognition pass point; recall based and cued click points. Cued click points is the latest technique that provides hot spot pictures. This paper overcomes authentication concepts incorporate with graphical username and password techniques.
Show more

6 Read more

Study and develop a new graphical password system

Study and develop a new graphical password system

The first idea for graphical passwords was described by Blonder (1996). His approach was to let the user click, with a mouse or stylus, on a few chosen regions in an image that appeared on the screen. If the correct regions were clicked in, the user as authenticated, otherwise the user was rejected. There are some points to be discussed about the graphical password idea that is the creation and learning of the graphical password because from a human viewpoint, the problem of creating a password is making it memorable so that the user can retrieve it later. In a graphical password system, a user choosing click locations in an image needs to choose memorable locations since there are two issues in memorability: the nature of the image itself and the sequence of click locations, the memory because most existing graphical password systems can be classified as being based on either recognition or cued recall. Recognition involves identifying whether one has encountered an item before. In a graphical password system based on recognition, the user has to be able only to recognize previously seen images. By contrast, pure recall is retrieval without external cues to aid memory, e.g. remembering a textual password that one has not written down and the efficiency and perception of efficiency are important in password systems because users want quick access to systems. Time to input a highly practiced graphical password can be predicted by Fitts’ Law, which states that the time to point to a target depends on the distance and size of the target.
Show more

19 Read more

Capcha as a Graphical Password A new Security Issues

Capcha as a Graphical Password A new Security Issues

We have proposed CaRP, a new security primitive relying on unsolved hard AI problems. CaRP is both a Captcha and a graphical password scheme. The notion of CaRP introduces a new family of graphical passwords, which adopts a new approach to counter online guessing attacks: a new CaRP image, which is also a Captcha challenge, is usedfor every login attempt to make trials of an online guessing attack computationally independent of each other. A password of CaRP can be found only probabilistically by automatic online guessing attacks including brute-force attacks, a desired security property that other graphical password schemes lack. Hotspots in CaRP images can no longer be exploited to mount automatic online guessing attacks, an inherent vulnerability in many graphical password systems. CaRP forces adversaries to resort to significantly less efficient and much more costly human-based attacks. In addition to offering protection from online guessing attacks, CaRP is also resistant to Captcha relay attacks, and, if combined with dual- view technologies, shoulder-surfing attacks. CaRP can also help reduce spam emails sent from a Web email service. Our usability study of two CaRP schemes we have implemented is encouraging. For example, more participants considered AnimalGrid and ClickText easier to use than PassPoints and a combination of text
Show more

5 Read more

Graphical Password Authentication using Image Segmentation

Graphical Password Authentication using Image Segmentation

authentication system with extensive findings to support it. Graphical password authentication can be implemented using two techniques - Recall based and Recognition based. The basic idea of using the image segmentation system is that using images as a security will lead to high memorability and decrease the chances to choose insecure passwords. This, in turn, should increase overall password security. Our primary question is the following: Are graphical passwords competitive to alphanumeric passwords in terms of security, performance and retention?
Show more

5 Read more

Survey on Graphical Password based User Authentication

Survey on Graphical Password based User Authentication

impact on the DAS password space -- The size of DAS password space decreases significantly with fewer strokes for a fixed password length. The length of a DAS password also has a significant impact but the impact is not as strong as the stroke- count. To improve the security, Thorpe and van Oorschot proposed a “Grid Selection” technique. The selection grid is an initially large, fine grained grid from which the user selects a drawing grid, a rectangular region to zoom in on, in which they may enter their password (figure7). This would significantly increase the DAS password space. Goldberg et al. [27] did a user study in which they used a technique called “Passdoodle”. This is a graphical password comprised of handwritten designs or text, usually drawn with a stylus onto a touch sensitive screen. Their study concluded that users were able to remember complete doodle images as accurately as alphanumeric passwords. The user studies also showed that people are less likely to recall the order in which they drew a DAS password. However, since the user study was done using a paper prototype instead of computer programs, with verifications done by a human rather than computer, the accuracy of this study is still uncertain.
Show more

9 Read more

USER AUTHENTICATION BY SECURED GRAPHICAL PASSWORD IMPLEMENTATION

USER AUTHENTICATION BY SECURED GRAPHICAL PASSWORD IMPLEMENTATION

Abstract— Graphical password is very strong password as compare to the text password and which is easily we can remember. Those who are use this system, authenticate themselves by identifying correct images fro set of displayed images. However, despite the impressive results of user studies on experimental graphical passwords schemes, their overall commercial adaptations have been relatively less. In this paper, we have searched reasons behind the less commercial acceptance of graphical password and we have invent such technique to overcome the limitation of existing system. Based on this technique we design graphical password Main goal of this system is to work as a cued recognition based graphical authentication scheme that allows users to make combination of text , images and numbers as their password, we have the strengths of Numbers, Alphabets and Pictures together to effectively defeat prevalent forms of social hacking. We have taken sample test of a user study with 65 participants to evaluate the viability of our proposed design. Results of the test are very good which indicates that our proposed systems early starting is secure .
Show more

8 Read more

A Survey on Different Graphical Password Authentication Techniques

A Survey on Different Graphical Password Authentication Techniques

ABSTRACT: Nowadays, user authentication is an important topic in the field of information security. To enforce security of information, passwords were introduced. Text based password is a popular authentication method used from ancient times. However text based passwords are prone to various attacks such as dictionary attacks, guessing attacks, brute force attacks, social engineering attacks etc. Numerous graphical password schemes have been proposed so far as it improves password usability and security. In this paper, we conduct a comprehensive survey of the existing graphical password techniques. We can categorize these techniques into four: recognition-based, pure recall-based, cued-recall based and hybrid approaches. Here we analyze the strengths and drawbacks of each method. This survey will be particularly useful for researchers who are interested in developing new graphical password algorithms as well as industry practitioners who are interested in deploying graphical password techniques.
Show more

9 Read more

Survey Of Graphical Password Authentication Techniques

Survey Of Graphical Password Authentication Techniques

Jiminy [4] proposed a hybrid scheme in which image is used as a reminder for helping users to choose easy to remember graphical passwords. In this scheme, based on the color, templates are given to the users that contain several holes. First, the user chooses an image, then selects a colored template, then clicks on a specific location inside the image, and then selects the position to place the template and stores the password. At the time of login, the users have to choose the right template, place it on the correct location on the image then enter the characters visible through the holes from top to bottom. Memorability of the passwords in this scheme is higher than text based password as this scheme only requires users to remember the correct location of template on the image. Gao et al. proposed a hybrid scheme [13] using CAPTCHA (Completely Automated Public Turing tests to tell Computer and Humans Apart). It retains all the advantages of graphical password schemes and CAPTCHA technology.
Show more

8 Read more

A Novel Graphical Password Authentication Scheme

A Novel Graphical Password Authentication Scheme

The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, user tends to pick passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to remember. In this paper, we present a new security primitive based on hard AI problems, namely, a novel family of graphical password systems built on top of Captcha technology, which we call Captcha as graphical passwords (CaRP). CaRP is both a Captcha and a graphical password scheme. CaRP addresses a number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual-view technologies, shoulder-surfing attacks. Notably, a CaRP password can be found only probabilistically by automatic online guessing attacks even if the password is in the search set. CaRP also offers a novel approach to address the well-known image hotspot problem in popular graphical password systems, such as PassPoints, that often leads to weak password choices. CaRP is not a panacea, but it offers reasonable security and usability and appears to fit well with some practical applications for improving online security.
Show more

7 Read more

SOUND SIGNATURE IN GRAPHICAL PASSWORD AUTHENTICATION

SOUND SIGNATURE IN GRAPHICAL PASSWORD AUTHENTICATION

ABSTRACT: Many security primitives are based on hard mathematical problems. Using hard AI problems for security is emerging as an exciting new paradigm, but has been underexplored. In this paper, we present a new security primitive based on hard AI problems, namely, a novel family of graphical password systems built on top of Captcha technology, which we call Captcha as graphical passwords (CaRP). CaRP is both a Captcha and a graphical password scheme. CaRP addresses a number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual-view technologies, shoulder-surfing attacks.
Show more

7 Read more

A Shoulder Surfing Resistant Graphical Password System             

A Shoulder Surfing Resistant Graphical Password System             

Authentication is the first security mechanism that can be used to prevent unauthorized access to the system. In addition, textual password (text-based password) is the most famous authentication mechanism which has been used for several years. In this authentication method, a user selects a combination of characters as his password, which is required to memorize by him. However, in order to have a secure password, the generated password must follow several requirements such as minimum 8 characters, a combination of capital and small characters, alphanumeric, using special characters, ... etc. Thus, this makes the password to be complex (e.g. "@bu*%183bDIK), which also makes difficulties for a hacker to guess (dictionary attack) or break (brute force attack) it. Similarly, the generated complex password provides this challenge for the users to memorize it for further access. Thus, the users tend to pen down their long and random passwords somewhere or take the easy passwords instead. Graphical password is an alternative authentication password which can solve the problem of remembering the complex passwords in textual password approach. In this case, several images are used to represent a user password, rather than the text. Later on, upon login to the system, a user can select or produce the same graphic image correctly for accessing to the system. Since remembering the image is easier than the text, the selected images as the password is complex as well as easy to remember by the user at the same time. Additionally, the other advantage of graphical password is to prevent stealing the passwords if a keystroke logger such as malicious software (Trojan) is installed by a hacker in order to capture the text-based passwords. In general, there are three graphical password approaches such as recognition-based, pure recall-based and cued recall based. In the recognition- based approach, the user can pick several images such as icons or symbols which he recently selected in user
Show more

5 Read more

Pixel Value Graphical Password Scheme-Graphical Password Scheme Literature Review

Pixel Value Graphical Password Scheme-Graphical Password Scheme Literature Review

Repeating-a-selection technique is developed in order to make recall-base scheme can be apply on computer application. This technique require user to repeat sequences of actions originally conducted by the user during the enrolment stage. In Blonder’s method, users require to click on several image locations. This method offer limited choice of click-point image location. Blonder’s method clickpoints grids limitation then inherit on PassGo method. Even PassGo was initially designed for enhancing DAS method, clickpoints on grids intersection show similarity on Blonder’s limited clickpoints grids features. Passpoint method was introduced to overcome blonder method limitation. User may click on any click-point on a single provided image background. However, graphical password users had more difficulties learning the password, and took more time to input their passwords than the alphanumerical users. Later Wiedenbeck, also conducted a user study to evaluate the effect of tolerance of clicking during the re-authenticating stage, and the effect of image choice in the system. The result showed that memory accuracy for the graphical password is strongly reduced after using smaller tolerance for the user clicked points, but the choices of images do not make a significant difference. The result showed that the system works for a large variety of images (Wiedenbeck, S., 2005). Google introduce Passlogix that allow user to choose several image rather than clickpoints. However, this technique only provides a limited password space and there is no ease way to prevent people from picking poor passwords (for example, a full house of cards).
Show more

8 Read more

Graphical Password Authentication using Images Sequence

Graphical Password Authentication using Images Sequence

Authentication that is Graphical Password Authentication using Images Sequence. In existing environment, a very important problem in information security is user authentication. There are many authentication techniques like textual, graphical, biometric, smart card etc. The existing graphical authentication techniques based on images selection are not good enough because in these techniques images are predefined by the system. In this paper, a new technique is proposed. In this method, user will upload images from his/her personal gallery/directory for password selection and images uploaded by one user will not be visible to other user. Graphical password is used as an alternative to textual/traditional alphanumeric password. Traditional alphanumeric password is difficult to memorize and usually forget by users as times passes when user remain unattached from the system, but in case of graphical password there are less chances to forget password because people remember images more easily than text based password. There are also less chances for hackers to steal the graphical based password because hackers will be unable to access the images uploaded by the user as password. We tested this method in a Web- based application.
Show more

9 Read more

On the Use of Image and Emojis in Graphical Password Application

On the Use of Image and Emojis in Graphical Password Application

The motivation lies in graphical password authentication based on the assumption that images are easier to remember and secure than textual password. It is generally easier for people to recognize the displayed item than to use their memory to recall the same information without any help [1]. A classical cognitive science experiment has shown that people have a strong image memory capability [2]. Recognition-based techniques are therefore a preferable graphical password, where a number of user-selected images are identified amongst others. This method was suggested as a helpful solution to textual passwords, as it contains many valuable features such as ease of memorize, convenience and a reasonable degree of security. For a solid authentication scheme, the password space is essential. Most recognition schemes commonly have small space for passwords, while many systems offer a significantly larger space for passwords. The proposed scheme therefore utilizes both techniques to achieve the best. In this study, the researchers try to examine how emojis can mitigate and achieve this objective.
Show more

7 Read more

Image Based CAPTCHA as a Graphical Password

Image Based CAPTCHA as a Graphical Password

In this paper author implemented three different group of images i.e. 1. Famous Place, 2.Famous People, 3.Reputed Company Name each contains 25 images. This paper introduces image based captcha to protect user data or unauthorized access of information. In that password is created from images and text password. Current system is based on only text password but it has disadvantages small password mostly used and easy to remember. This type of password is easy to guess through different attack i.e. dictionary attack and brute force attack. In this paper we have proposed a new image password scheme. In this Recognition based technique is used with numerical password which provide more security and easy to remember text and graphical password.
Show more

8 Read more

Providing Security Using CAPTCHA: Captcha as A Graphical Password

Providing Security Using CAPTCHA: Captcha as A Graphical Password

ABSTRACT: Various security primitives uses hard mathematical problems. Use of hard AI problems for security is emerging and exciting new pattern, but has not yet been explored. In our project, we present a new security primitive based on hard AI problems, this system is named as Captcha as graphical passwords (CaRP). CaRP is Captcha as well as graphical password scheme. CaRP symbolize a number of security problems together, such as online guessing attacks, relay attacks, and shoulder-surfing attacks. Generally, a CaRP password can be found only probabilistically by automatic online guessing attacks even if the password is in the search set CaRP also offers well approach to address the well-known image hotspot problem in popular graphical password systems, like PassPoints, that generally leads to choices of weak password.
Show more

8 Read more

Captcha as a Graphical Password Based on Hard AI Problems

Captcha as a Graphical Password Based on Hard AI Problems

This application is mainly used to differentiate between human and machine apart and to solve the “Hard AI Problem”. It also increases the security level and prevents the important data from threats by providing three levels of security. We present a new security originally based on hard AI problems, namely, a novel family of graphical password systems built on top of Captcha technology, which we refer as “Captcha as graphical passwords (CaRP)”. CaRP is both a Captcha and a graphical password scheme.

7 Read more

Hybrid Graphical Password: A Strong Multilayer Security Primitive

Hybrid Graphical Password: A Strong Multilayer Security Primitive

ABSTRACT: CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is a technology which humans can pass but computer programs cannot pass. Using this primary CAPTCHA, a new secondary technology is built called as Graphical CAPTCHA. It is also called as CaRP i.e., Captcha as gRaphical Password. With this hybrid of CAPTCHA and graphical password, many security problems such as online guessing attacks, dictionary attacks can be dealt with. Thus, CaRP is not a solution to all the attacks, but it provides a great level of security and allows access to the authorized users.
Show more

5 Read more

Cued Click Point Technique for Graphical Password Authentication

Cued Click Point Technique for Graphical Password Authentication

Abstract— In today’s world the password security is very important. For password protection various techniques are available. Cued Click Points are a click-based graphical password scheme, a cued-recall graphical password technique. Users Click on one point per image for a sequence of images. The next image is based on the previous click-point. The passwords which are easy to memorize are chosen by the users and it becomes easy for attackers to guess it, but the passwords assigned by the strong system are difficult for users to remember. In this paper, we focus on the evaluation of graphical password authentication system using Cued Click Points, including usability and security. In this authentication system, our usability goal is to support the users in selecting better passwords, thus increases the security by expanding the effective password space. The emergence of hotspots is mainly because of poorly chosen passwords. Thus click-based graphical passwords encourage users to select more random, and hence more complex to guess, click-points.
Show more

7 Read more

Show all 1088 documents...