A Shoulder Surfing Resistant Graphical Authentication System

Authors

  • D. Ravi  Department of Computer Science and Engineering, Kathir College of Engineering, Coimbatore, Tamil Nadu, India
  • I. S. Narmadha  Department of Computer Science and Engineering, Kathir College of Engineering, Coimbatore, Tamil Nadu, India
  • L. Nivetha  Department of Computer Science and Engineering, Kathir College of Engineering, Coimbatore, Tamil Nadu, India
  • R. Vijayalakshmi  Department of Computer Science and Engineering, Kathir College of Engineering, Coimbatore, Tamil Nadu, India

Keywords:

Graphical Passwords, Authentication, Shoulder Surfing Attack.

Abstract

People enjoy the convenience of on-line services, but online environments may bring many risks. We propose a virtual password and QR code concept involving a small amount of human computing to secure users’ passwords in on-line environments. We adopted user-determined randomized linear generation functions to secure users’ passwords based on the fact that a server has more information than any adversary does. We propose differentiated QR code mechanisms in which a user has the freedom to choose a virtual password scheme ranging from weak security to strong security, where a virtual password requires a small amount of human computing to secure users’ passwords. A functionis used to implement the virtual password concept with security for complexity requiring a small amount of human computing. For user-specified functions, we adopt secretlittle functions in which security is enhanced by to generate QR CODE.

References

  1. A.Paivio, T.Rogers, and P.Smythe, "Why are pictures easier to recall than words?" Psychonomic Science, 1968.
  2. D.Nelson, U.Reed, and J.Walling, "Picture superiority effect," Journal of Experimental Psychology: Human Learning and Memory, vol. 3, pp. 485–497, 1977.
  3. I.Jermyn, A.Mayer, F.Monrose, M. Reiter, and A.Rubin, "The design and analysis of graphical passwords," in Proceedings of the 8th conference on USENIX Security Symposium-Volume 8. USENIX Association, 1999, pp. 1–1.
  4. R.Dhamija and A.Perrig, "Deja vu: A user study using images for authentication," in Proceedings of the 9th conference on USENIX SecuritySymposium-Volume9. USENIX Association,2000,pp. 4–4.
  5. S.Brostoff and M. Sasse, "Are passfaces more usable than pass- words? a field trial investigation," PEOPLE AND COMPUTERS, pp. 405–424, 2000.
  6. K. Gilhooly, "Biometrics: Getting back to business," Computer- world, May, vol. 9, 2005.
  7. S.Wiedenbeck, J.Waters, J.Birget, A. Brodskiy, and N. Memon, "Passpoints: Design and longitudinal evaluation of a graphicalpasswordsystem,"InternationalJournalofHuman-ComputerStudies, vol. 63, no. 1-2, pp. 102–127, 2005.
  8. S.Gurav, L.Gawade, P.Rane, and N. Khochare, "Graphical password authentication: Cloud securing scheme," in Electronic Systems, Signal Processing and Computing Technologies (ICESC), 2014 International Conference on, Jan 2014, pp. 479–483.
  9. "Realuser," http://www.realuser.com/

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
D. Ravi, I. S. Narmadha, L. Nivetha, R. Vijayalakshmi, " A Shoulder Surfing Resistant Graphical Authentication System, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.569-572, March-April-2017.