A Shoulder Surfing Resistant Graphical Authentication System
Keywords:
Graphical Passwords, Authentication, Shoulder Surï¬ng Attack.Abstract
People enjoy the convenience of on-line services, but online environments may bring many risks. We propose a virtual password and QR code concept involving a small amount of human computing to secure users’ passwords in on-line environments. We adopted user-determined randomized linear generation functions to secure users’ passwords based on the fact that a server has more information than any adversary does. We propose differentiated QR code mechanisms in which a user has the freedom to choose a virtual password scheme ranging from weak security to strong security, where a virtual password requires a small amount of human computing to secure users’ passwords. A functionis used to implement the virtual password concept with security for complexity requiring a small amount of human computing. For user-specified functions, we adopt secretlittle functions in which security is enhanced by to generate QR CODE.
References
- A.Paivio, T.Rogers, and P.Smythe, "Why are pictures easier to recall than words?" Psychonomic Science, 1968.
- D.Nelson, U.Reed, and J.Walling, "Picture superiority effect," Journal of Experimental Psychology: Human Learning and Memory, vol. 3, pp. 485–497, 1977.
- I.Jermyn, A.Mayer, F.Monrose, M. Reiter, and A.Rubin, "The design and analysis of graphical passwords," in Proceedings of the 8th conference on USENIX Security Symposium-Volume 8. USENIX Association, 1999, pp. 1–1.
- R.Dhamija and A.Perrig, "Deja vu: A user study using images for authentication," in Proceedings of the 9th conference on USENIX SecuritySymposium-Volume9. USENIX Association,2000,pp. 4–4.
- S.Brostoff and M. Sasse, "Are passfaces more usable than pass- words? a field trial investigation," PEOPLE AND COMPUTERS, pp. 405–424, 2000.
- K. Gilhooly, "Biometrics: Getting back to business," Computer- world, May, vol. 9, 2005.
- S.Wiedenbeck, J.Waters, J.Birget, A. Brodskiy, and N. Memon, "Passpoints: Design and longitudinal evaluation of a graphicalpasswordsystem,"InternationalJournalofHuman-ComputerStudies, vol. 63, no. 1-2, pp. 102–127, 2005.
- S.Gurav, L.Gawade, P.Rane, and N. Khochare, "Graphical password authentication: Cloud securing scheme," in Electronic Systems, Signal Processing and Computing Technologies (ICESC), 2014 International Conference on, Jan 2014, pp. 479–483.
- "Realuser," http://www.realuser.com/
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT
This work is licensed under a Creative Commons Attribution 4.0 International License.