A Shoulder Surfing Resistant Graphical Authentication System

Authors(4) :-D. Ravi, I. S. Narmadha, L. Nivetha, R. Vijayalakshmi

People enjoy the convenience of on-line services, but online environments may bring many risks. We propose a virtual password and QR code concept involving a small amount of human computing to secure usersí passwords in on-line environments. We adopted user-determined randomized linear generation functions to secure usersí passwords based on the fact that a server has more information than any adversary does. We propose differentiated QR code mechanisms in which a user has the freedom to choose a virtual password scheme ranging from weak security to strong security, where a virtual password requires a small amount of human computing to secure usersí passwords. A functionis used to implement the virtual password concept with security for complexity requiring a small amount of human computing. For user-specified functions, we adopt secretlittle functions in which security is enhanced by to generate QR CODE.

Authors and Affiliations

D. Ravi
Department of Computer Science and Engineering, Kathir College of Engineering, Coimbatore, Tamil Nadu, India
I. S. Narmadha
Department of Computer Science and Engineering, Kathir College of Engineering, Coimbatore, Tamil Nadu, India
L. Nivetha
Department of Computer Science and Engineering, Kathir College of Engineering, Coimbatore, Tamil Nadu, India
R. Vijayalakshmi
Department of Computer Science and Engineering, Kathir College of Engineering, Coimbatore, Tamil Nadu, India

Graphical Passwords, Authentication, Shoulder SurÔ¨Āng Attack.

  1. A.Paivio, T.Rogers, and P.Smythe, "Why are pictures easier to recall than words?" Psychonomic Science, 1968.
  2. D.Nelson, U.Reed, and J.Walling, "Picture superiority effect," Journal of Experimental Psychology: Human Learning and Memory, vol. 3, pp. 485–497, 1977.
  3. I.Jermyn, A.Mayer, F.Monrose, M. Reiter, and A.Rubin, "The design and analysis of graphical passwords," in Proceedings of the 8th conference on USENIX Security Symposium-Volume 8. USENIX Association, 1999, pp. 1–1.
  4. R.Dhamija and A.Perrig, "Deja vu: A user study using images for authentication," in Proceedings of the 9th conference on USENIX SecuritySymposium-Volume9. USENIX Association,2000,pp. 4–4.
  5. S.Brostoff and M. Sasse, "Are passfaces more usable than pass- words? a field trial investigation," PEOPLE AND COMPUTERS, pp. 405–424, 2000.
  6. K. Gilhooly, "Biometrics: Getting back to business," Computer- world, May, vol. 9, 2005.
  7. S.Wiedenbeck, J.Waters, J.Birget, A. Brodskiy, and N. Memon, "Passpoints: Design and longitudinal evaluation of a graphicalpasswordsystem,"InternationalJournalofHuman-ComputerStudies, vol. 63, no. 1-2, pp. 102–127, 2005.
  8. S.Gurav, L.Gawade, P.Rane, and N. Khochare, "Graphical password authentication: Cloud securing scheme," in Electronic Systems, Signal Processing and Computing Technologies (ICESC), 2014 International Conference on, Jan 2014, pp. 479–483.
  9. "Realuser," http://www.realuser.com/

Publication Details

Published in : Volume 2 | Issue 2 | March-April 2017
Date of Publication : 2017-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 569-572
Manuscript Number : CSEIT1722181
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

D. Ravi, I. S. Narmadha, L. Nivetha, R. Vijayalakshmi, "A Shoulder Surfing Resistant Graphical Authentication System", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.569-572, March-April-2017.
Journal URL : http://ijsrcseit.com/CSEIT1722181

Article Preview

Follow Us

Contact Us