Graphical User Authentication in Mobile Device using the web RGB color palette

Existing graphical authentication methods take into account the fact that users are more capable of remembering pictures instead of text. Graphical authentication schemes are expected to be less vulnerable to specific hacker attack techniques that have greatly improved in recent years. The usability aspect of a graphical authentication product refers to the extent that a product can be used by users to achieve goals with effectiveness, efficiency and satisfaction in a specified context of use. This paper describes a prototype system providing graphical authentication of mobile devices over the Internet, covering both usability and security aspects. Color images are assigned to the mobile users and authentication is achieved by modifying the Red-Green Blue (RGB) color intensity values of the assigned image.

[1]  Michael K. Reiter,et al.  On User Choice in Graphical Password Schemes , 2004, USENIX Security Symposium.

[2]  Eiji Okamoto,et al.  A User Identification System Using Signature Written with Mouse , 1998, ACISP.

[3]  Dennis J. Delprato,et al.  Mind and Its Evolution: A Dual Coding Theoretical Approach , 2009 .

[4]  Dawei Hong,et al.  A Shoulder-Surfing Resistant Graphical Password Scheme - WIW , 2003, Security and Management.

[5]  Ali Mohamed Eljetlawi,et al.  Graphical password: Usable graphical password prototype , 2009 .

[6]  Susan Wiedenbeck,et al.  Design and evaluation of a shoulder-surfing resistant graphical password scheme , 2006, AVI '06.

[7]  Richard P. Ayers,et al.  Picture Password: A Visual Login Technique for Mobile Devices , 2003 .

[8]  Arash Habibi Lashkari,et al.  A Wide range Survey on Recall Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns , 2010, ArXiv.

[9]  Paul C. van Oorschot,et al.  Passwords: If We're So Smart, Why Are We Still Using Them? , 2009, Financial Cryptography.

[10]  Susan Wiedenbeck,et al.  Authentication Using Graphical Passwords: Basic Results , 2005 .

[11]  Michael K. Reiter,et al.  The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.

[12]  Vibha Sazawal,et al.  Doodling our way to better authentication , 2002, CHI Extended Abstracts.

[13]  Adrian Perrig,et al.  This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .

[14]  Ying Zhu,et al.  Graphical passwords: a survey , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[15]  Li-Tung Weng,et al.  Graphical Passwords Using Images with Random Tracks of Geometric Shapes , 2008, 2008 Congress on Image and Signal Processing.

[16]  J. Kase Graphical Passwords , 2008 .

[17]  Hideki Koike,et al.  Awase-E: Image-Based Authentication for Mobile Phones Using User's Favorite Images , 2003, Mobile HCI.

[18]  Maslin Masrom,et al.  A Survey on Recognition Based Graphical User Authentication Algorithms , 2009, ArXiv.

[19]  Julie Thorpe,et al.  Towards secure design choices for implementing graphical passwords , 2004, 20th Annual Computer Security Applications Conference.

[20]  Nasir D. Memon,et al.  PassPoints: Design and longitudinal evaluation of a graphical password system , 2005, Int. J. Hum. Comput. Stud..