Enhanced Graphical Password Based Authentication Using Persuasive Cued Click-Points

Narayanan Prasanth N*, Azarudeen K**, Gulam Ahamed Kabeer M***, Gulam Peer Mohamed J****
* Assistant Professor, Department of Information Technology, National College of Engineering, Maruthakulam.
**-**** Student, Department of Information Technology, National College of Engineering, Tirunelveli, India.
Periodicity:January - March'2014
DOI : https://doi.org/10.26634/jse.8.3.2809

Abstract

This paper introduces and presents the result of a systemic study of the persuasive cued click point graphical password scheme, including usability and security evaluation and implementation consideration. An important usability goal for the knowledge-based authentication system is to support user in selecting a better password thus increasing security by expanding the effective password space. They use persuasion to influence user choice in click based graphical password, encouraging users to select more random and hence more difficult to guess click-points.

Keywords

Graphical Password, Authentication, Cued click points, Persuasive Technology.

How to Cite this Article?

Prasanth,N.N., Azarudeen.K., Kabeer,G,A.M., and Mohamed,G,P.J. (2014). Enhanced Graphical Password Based Authentication Using Persuasive Cued Click-Points. i-manager’s Journal on Software Engineering, 8(3),26-30. https://doi.org/10.26634/jse.8.3.2809

References

[1]. S. Chiasson, A. Forget, R. Biddle, and P. van Oorschot, “Influencing users towards better passwords: Persuasive Cued Click-Points,” in Human Computer Interaction (HCI), The British Computer Society, September 2008.
[2]. S. Chiasson, A. Forget, E. Stobert, P. van Oorschot, and R. Biddle, “Multiple password interference in text and click-based graphical passwords.” in ACM Computer and Communications Security (CCS), November 2009.
[3]. J. Yan, A. Blackwell, R. Anderson, and A. Grant, “The memorability and security of passwords,” in Security and Usability: Designing Secure Systems That People Can Use, L. Cranor and S. Garfinkel, Eds. O'Reilly Media, 2005, ch. 7, pp. 129–142.
[4]. S. Chiasson, P. van Oorschot, and R. Biddle, “Graphical password authentication using Cued Click Points,” in European Symposium On Research In Computer Security (ESORICS), LNCS 4734, September 2007, pp. 359–374.
[5]. D. Nelson, V. Reed, and J. Walling, “Pictorial Superiority Effect,” Journal of Experimental Psychology: Human Learning and Memory, Vol. 2, No. 5, pp. 523–528, 1976.
[6]. R. Biddle, S. Chiasson, and P. van Oorschot, “Graphical passwords: Learning from the first twelve years,” ACM Computing Surveys (to appear), Vol. 44, No. 4, 2012.
[7]. A. De Angeli, L. Coventry, G. Johnson, and K. Renaud, “Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems,” International Journal of Human-Computer Studies, Vol. 63, No. 1-2, pp. 128–152, 2005.
[8]. E. Tulving and Z. Pearlstone, “Availability versus accessibility of information in memory for words,” Journal of Verbal Learning and Verbal Behavior, Vol. 5, pp. 381–391, 1966.
[9]. S.Wiedenbeck, J.Waters, J. Birget, A. Brodskiy, and N. Memon, “PassPoints: Design and longitudinal evaluation of a graphical password system,” International Journal of Human-Computer Studies, Vol. 63, No. 1-2, pp. 102–127, 2005.
[10]. B. Fogg, Persuasive Technologies: Using Computers to Change What We Think and Do. Morgan Kaufmann Publishers, San Francisco, CA, 2003.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.