An Efficient Graphical Authentication System

Authors

  • Aayush Kumar Department of CSE, K.S Institute of Technology, Bangalore, Karnataka, India
  • Keshav Kumar Department of CSE, K.S Institute of Technology, Bangalore, Karnataka, India
  • Siddharth Shekhar Singh Department of CSE, K.S Institute of Technology, Bangalore, Karnataka, India
  • M. Vaneeta Department of CSE, K.S Institute of Technology, Bangalore, Karnataka, India

DOI:

https://doi.org/10.51983/ajsat-2017.6.1.937

Keywords:

Graphical Passwords, Authentication, Shoulder, Surfing, Attack

Abstract

Password authentication is majorly used in applications for computer security and privacy. However, human actions such as selecting bad passwords and inputting passwords in an insecure way are considered as” the weakest link” in the authentication process. Rather than arbitrary alphanumeric string, users generally use weak password, more often based on their personal information. With new technologies coming up and mobile apps piling up, users can use the application anytime and anywhere with various devices. Although the evolution is convenient but it also increases the probability of exposing passwords to shoulder surfing attacks. Attackers can observe directly or use external recording devices to collect users’ credentials. To overcome this problem, a novel authentication system Pass Matrix, based on graphical passwords is proposed to resist shoulder surfing attacks. With a one-time code and horizontal and vertical bars covering the entire scope of pass-images, Pass Matrix will offer no hint to attackers to figure out or narrow down the password even they conduct multiple camera-based attacks. We will implement a Pass Matrix prototype and from the experimental result, the proposed system will achieve better resistance to shoulder surfing attacks while maintaining usability.

References

Phen-Lan Lin, Li-Tung Weng and Po-Whei Huang, "Graphical passwords using images with random tracks of geometric shapes," 2008 Congress on Images and Signal Processing. 2008.

Sacha Brostoff, M. Angela Sasse, "Are Passfaces More Usable Than Passwords? A Field Trial Investigation," 2000.

Dhamija R. and Perrig A., "Déjà vu: A User Study Using Images for Authentication," in Proceedings of 9th USENIX Security Symposium, 2000.

Davis, F. Monrose, and M. K. Reiter, "On user choice in graphical password schemes," in Proceedings of the 13th Usenix Security Symposium. San Diego, CA, 2004.

K. Bicakci, N. B. Atalay, M. Yuceel, H. Gurbaslarand B. Erdeniz, "Towards usable solutions to graphical password hotspot problem," In 33rd Annual IEEE International Computer Software and Applications Conference, 2009.

Weinshall D., "Cognitive Authentication Schemes Safe against Spyware," in IEEE Symposium on Security and Privacy (S&P), 2006.

Downloads

Published

28-05-2017

How to Cite

Kumar, A., Kumar, K., Shekhar Singh, S., & Vaneeta, M. (2017). An Efficient Graphical Authentication System. Asian Journal of Science and Applied Technology, 6(1), 42–45. https://doi.org/10.51983/ajsat-2017.6.1.937