Review on Graphical Password Authentication System

Syeatha Merlin Thampy*, Alphonsa Johny**
* M.Tech Scholar, Department of Computer Science & Engineering, St. Joseph College of Engineering and Technology, Palai, India.
** Assistant Professor, Department of Computer Science & Engineering, St. Joseph College of Engineering and Technology, Palai, India.
Periodicity:December - February'2015
DOI : https://doi.org/10.26634/jit.4.1.3282

Abstract

Authentication is the mechanism in which the system check the identity of the user who access it. Traditional alphanumeric passwords are used. Due to the limitation of human memory, most users try to choose short-term or simple passwords which are easy to remember. Surveys show that frequent passwords are personal names of family members, birth date, or common words. In most cases, these passwords are easy to guess and vulnerable to dictionary attack.In an attempt to create more memorable passwords, graphical password systems have been devised. In these systems, authentication is based on clicking on images rather than typing alphanumeric strings. This paper presents a survey on some graphical password authentication systems

Keywords

Graphical Password, Authentication, Alphanumeric Passwords, Brute Force, Dictionary Attacks, Shoulder Surfing

How to Cite this Article?

Thampy. S. M and Johny. A (2015). Review on Graphical Password Authentication System. i-manager’s Journal on Information Technology, 4(1), 33-38. https://doi.org/10.26634/jit.4.1.3282

References

[1]. Sacha Brostoff & M. Angela Sasse. (2000). "Are passfaces more usable than passwords?" A Field Trial Investigation. Proceedings of HCI (2000). pp.405–424.
[2]. L. Sobrado and J. C. Birget, "Graphical passwords," The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research, Vol. 4. 2002.
[3]. Darren, D, Fabian, M., and Michael, K. R. (2004). "On user choice in graphical password schemes".
[4]. Wayne, J., Serban, G., Vlad, K., Rick, A. and Ryan, S., (2003). "Picture password: a visual login technique for mobile devices," NIST NISTIR 7030.
[5]. Jermyn Ian, A. Mayer, F. Monrose, M. K. Reiter and A. D.Rubin, (1999). "The design and analysis of graphical passwords", Proceedings of the Eighth USENIX Security Symposium. USENIX Association pp.1–14.
[6]. Christopher Varenhorst, (2004). "Passdoodles; a Lightweight Authentication Method", Massachusetts Institute of Technology, Research Science Institute.
[7]. Muhammad Daniel Hafiz, Abdul Hanan Abdullah, Norafida Ithnin, Hazinah K. Mammi, (2008). "Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique"; IEEE Explore.
[8]. Susan Wiedenbecka, Jim Watersa, Jean-Camille Birgetb and Alex Brodskiyc, Nasir Memon. PassPoints, (2005). "Design and longitudinal evaluation of a graphical password system", Academic Press, Inc. pp. 02-127.
[9]. S. Chiasson, P. van Oorschot, and R. Biddle, (2007). "Graphical password authentication using Cued Click Points," European Symposium on Research in Computer Security (ESORICS), LNCS4734.
[10]. S. Chiasson, E. Stobert, A. Forget, R. Biddle, and P. van Oorschot, (2011). "Persuasive cued click points: Design, implementation, and evaluation of a knowledge-based authentication mechanism", School of Computer Science, Carleton University, Tech. Rep. TR-11-03.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.