Comparison of Graphical Password Authentication Techniques

User Authentication is the most crucial aspect of cyber security. To prevent systems from various types of attacks, password protection to the system is usually provided. The most widely used authentication method using normal text passwords which contains a sequence of alphabets, numbers, and special characters). User mostly tends to choose text passwords which are easy for them to remember (eg. Their birthdate, phone number, etc)... However, even though the technique is user friendly, it is susceptible to many attacks. The other type of Authentication scheme is using Graphical Passwords. These passwords contain images which are easier for humans to remember than the long stream of characters in text passwords. The paper discusses various approaches of using graphical passwords .The basic algorithms of graphical passwords are being compared based on security and usability parameters.

[1]  Ian Welch,et al.  A hybrid recognition and recall based approach in graphical passwords , 2012, OZCHI.

[2]  Ying Zhu,et al.  Graphical passwords: a survey , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[3]  Habibi Lashkari Arash A new algorithm for graphical user authentication based on rotation and resizing , 2010 .

[4]  Patrick Olivier,et al.  Graphical passwords & qualitative spatial relations , 2007, SOUPS '07.

[5]  Julie Thorpe,et al.  Towards secure design choices for implementing graphical passwords , 2004, 20th Annual Computer Security Applications Conference.

[6]  Nasir D. Memon,et al.  PassPoints: Design and longitudinal evaluation of a graphical password system , 2005, Int. J. Hum. Comput. Stud..

[7]  Mohammad Sarosh Umar,et al.  Graphical user authentication: A time interval based approach , 2012, 2012 IEEE International Conference on Signal Processing, Computing and Control.

[8]  Rachna Dhamija,et al.  Hash visualization in user authentication , 2000, CHI Extended Abstracts.

[9]  Adrian Perrig,et al.  This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .

[10]  Abdul Hanan Abdullah,et al.  Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique , 2008, 2008 Second Asia International Conference on Modelling & Simulation (AMS).

[11]  Michael K. Reiter,et al.  The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.