Study and Development of Graphical Authentication System for Secure File Transmission

  • Authors

    • P. L.P.Ramyasri
    • D. Malathi
    • J. D. Dorathi Jayaseeli
    • K. Senthilkumar
    2018-10-02
    https://doi.org/10.14419/ijet.v7i4.10.21042
  • Graphical Password, Pass Matrix, CAPTCHA, Image distortion, Doodle scheme, Standard recognition- based scheme.
  • The text-based password has been the most common practice from ancient days till present. Text based pass-words are also known for various threats, and it is prone to attacks like guessing attacks, dictionary attacks, social engineering attacks, brute force attacks, etc. The next immediate concept following the text based password is the graphical password schemes to improve password security and usability. In present days graphical passwords are being implemented more commonly. This approach is different from the traditional alpha numeric as it deals with images. In this paper a survey study is done to analyse various techniques used for authentication and also some of the methods for graphical authentication techniques like Pass Matrix, Cued Clicked points(CPP), CAPTCHA, Image distortion with text association, Doodle scheme, Standard recognition-based scheme, Stegno pin authentication method. Based on the existing methods, the future research can be done in order to improve security for graphical authentication.

     

     

  • References

    1. [1] Sun, Hung-Min, "A shoulder surfing resistant graphicalauthentication system," IEEE Transactions onDependable andSecure Computing (2016).

      [2] S. Gurav, L. Gawade, P. Rane, and N. Khochare, “Graphical password authentication: Cloud securing scheme,†InternationalConference on, in Electronic Systems, Signal Processing andComputing Technologies (ICESC),IEEE Jan 2014.

      [3] L. Wang, X. Chang, Z. Ren, H. Gao, X. Liu, and U. Aickelin, “Against spyware using captcha in graphical password scheme,†in 24th International Conference on Advanced Information Networking and Applications, IEEE, 2010.

      [4] T. Takada, “fakepointer: An authentication scheme for improving security against peeping attacks using video cameras,†in Mobile Ubiquitous Computing, Systems, and Technologies, Second International Conference on IEEE 2008.

      [5] Ms GrinalTuscano “Graphical password authentication using Pass faces†Int. Journal of Engineering Research and Applications March 2015.

      [6] Bianchi, Andrea, et al. "The phone lock: audio and haptic shoulder-surfing resistant PIN entry methods for mobile devices." Proceedings of the fifth international conference on Tangible, embedded, and embodied interaction. ACM, 2011.

      [7] Khamis, Mohamed, et al. "GTmoPass: two-factor authentication on public displays using gaze-touch passwords and personal mobile devices:" Proceedings of the 6th ACM International Conference on Pervasive Displays, 2017.

      [8] D. Tan, P. Keyani, and M. Czerwinski, “Spy-resistant keyboard: Towards more secure password entry on publicly observable touch screens,†in Proceedings of OZCHI-Computer-Human Interaction Special Interest Group (CHISIG) of Australia. Canberra, Australia:ACM Press,2005

      [9] Rosanne, and Ron Poet. "Measuring the revised guessability of graphical passwords" 5th International Conference on. Network and System Security (NSS), IEEE, 2011.

      [10] S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, “Passpoints: Design and longitudinal evaluation of a graphical password system,†International Journal of Human-Computer Studies, 2005

      [11] E. von Zezschwitz, A. De Luca, and H. Hussmann, “Honey,ishrunk the keys: Influences of mobile devices on password composition and authentication performance,†in Proceedings of the 8th Conference on Human-Computer Interaction: Fun, Fast, Foundational, New York, NY, USA: ACM, 2014.

      [12] Bianchi, I. Oakley, and D. S. Kwon, “The secure haptic keypad: A tactile password system,†in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, New York, NY, USA: ACM, 2010.

      [13] Antonella De Angeli, Lynne Coventry, Graham Johnson & Mike Coutts†USABILITY AND USER AUTHENTICATION: PICTORIALPASSWORDS VS. PIN†NCR-FSD AdvancedTechnology& Research, Discovery Centre, 3 Fulton Road Dundee DD2 4SW.

      [14] Oakley and A. Bianchi, “Multi-touch passwords for mobile device access,†in Proceedings of the ACM Conference on Ubiquitous Computing, New York, NY, USA: ACM, 2012.

      [15] M. Martinez-Diaz, J. Fierrez, and J. Galbally, “The doodb graphical password database: Data analysis and benchmark results,†Access, IEEE, 2013.

      [16] Zheng, Ziran, "A stroke-based textual password authentication scheme." Education Technology and Computer Science, 2009.ETCS'09.First International Workshop on.Vol.3. IEEE, 2009.

      [17] V. Roth, K. Richter, and R. Freidinger, “A pin-entry method resilient against shoulder surfing,†in Proceedings of the 11th ACM conference on Computer and communications security,ACM, 2004.

      [18] Gilhooly, "Biometrics: Getting Back to Business," in Computerworld, May 09, 2005.

      [19] Adams and M. A. Sasse, "Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures," Communications of the ACM, vol. 42, pp. 41-46, 1999.

  • Downloads

  • How to Cite

    L.P.Ramyasri, P., Malathi, D., D. Dorathi Jayaseeli, J., & Senthilkumar, K. (2018). Study and Development of Graphical Authentication System for Secure File Transmission. International Journal of Engineering & Technology, 7(4.10), 470-472. https://doi.org/10.14419/ijet.v7i4.10.21042