User Authentication Through Cued Click Points Based Graphical Password

Authors

  • Hasi Saha Lecturer, Department of Computer Science & Information Technology, HSTU, Dinajpur, Bangladesh
  • Ganesh Chandra Saha Assistant Professor, Department of Computer Science & Information Technology, BSMRAU, Gazipur, Bangladesh
  • Roshidul H Associate Professor, Department of Computer Science & Information Technology, BSMRAU, Gazipur, Bangladesh
  • Zakirul Islsam Department of Computer Science & Information Technology, HSTU, Dinajpur, Bangladesh

DOI:

https://doi.org/10.54536/ajaset.v3i1.38

Keywords:

Cued click points, Graphical passwords and Authentication

Abstract

User authentication is a fundamental component in most computer security context. In recent years, computer and network security has been formulated as a technical problem. A key area in security research is authentication which is the determination of whether a user should be allowed access to a given system or resource. In this respect, Authentication is a process by which a system verifies the identity of a user. Authentication may also be generalized by saying that to authenticate means to authorize. Users tend to pick passwords that can be easily guessed, on the other hand, if a password is hard to guess, then it is often hard to remember. To address this problem some researchers have developed authentication methods that use pictures as passwords, known as graphical passwords. Graphical passwords are a proposed alternative to text passwords that have been shown to have good usability and security properties that use images for login, and leverage the picture superiority effect for good usability and memorability. Categories of graphical passwords have been distinguished on the basis of different kinds of memory retrieval (recall, cued-recall, and recognition). Though there are several kinds of graphical password, But We have choose to implement the cued click based due to efficient and more secured, Cued click points is a click-based graphical password scheme, Users click on one point per image for a sequence of images. The next image is based on the previous clickpoint. Performance was very good in terms of speed, accuracy, and number of errors. Graphical passwords may offer better security than text-based passwords because many people, in an attempt to memorize text-based passwords, use plain words rather than the recommended jumble of characters.

Downloads

Download data is not yet available.

References

F. Alsulaiman.A.S. (July 2006). A novel 3D graphical password schema. In IEEE International Conference on Virtual Environments, Human-Computer Interfaces and Measurement Systems,

K. Renaud.( 2005). Evaluating authentication mechanisms, In L. Cranor and S. Garnkel, editors, Security and Usability: Designing Secure Systems That People Can Use.(pp103-128) .O'Reilly Media.

D. Klein. (1990.) Foiling the cracker: A survey of, and improvements to, password Security. In 2nd USENIX Security Workshop,

D. Davis, F. Monrose, and M. Reiter.( August 2004).On user choice in graphical password schemes. In 13th USENIX Security Symposium.

K.P. Yee. (2004). Aligning security and usability. IEEE Security & Privacy, 2(5), 48-55.

S.Chiasson, R. Biddle, and P. van Oorschot (July 2007), “A Second Look at the Usability of Click Based Graphical Passwords,” Proc. ACM Symp. Usable Privacy and Security (SOUPS).

Thorpe, J. and van Oorschot (2007), P.C. Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. USENIX Security Symp

S. Akula, V. Devisetty ((2004).),Image based registration and authentication system," Midwest Instruction and Computing Symposium.

R. Dhamija, A. Perrig,Dejμa Vu ((2000). User study using images for authentication", Ninth Usenix security Symposium 14-17.

I. Jeremyn, A. Mayer, F. Monrose, M.K. Reiter, A.D.Rubin (1999). The design and analysis of graphical passwords", Proc. 8th Usenix Security Symposium

W. Ku, M. Tsaur (2005). A remote user authentication scheme using strong graphical passwords", IEEE Conference on Local Computer Networks 351-357.

J.C. Birget, D. Hong, N. Memon (Sept. 2006). Graphical passwords based on robust discretization", IEEE Transactions on Information Forensics and Security, 1(3), 395-399. (Earlier version: Cryptology ePrint Archive, (http://eprint.iacr.org/2003/168, Aug. 2003.)

Furkan T., A. Ant Ozok, and Stephen H. Holden (July 2006).”A Comparison of Perceived and Real Shoulder-surfing Risks between Alphanumeric and Graphical Passwords”, Symposium on Usable Privacy and Security (SOUPS). Pittsburgh, Pennsylvania, USA: ACM. 56-66.

Adams, A. and Sasse, M.A.(1999). Users are not the enemy. CACM 42, 12 41-46.

Dirik, A.E., N. Menon, and J.C Birget(2007). Modeling user choice in the PassPoints graphical password scheme. ACM SOUPS.

Pierce J.D., Jason G. Wells, Matthew J. Warren, and David R. Mackay (2003).1st Australian Information security Manage-ment Conference,

William Stallings and Lawrie Brown. (2008). Computer Security:Principle and Practices. Pearson Education.

Adams A. and Sasse M.A. (1999). Graphical Passwords. Communications of the ACM, ACM SOUPS (42), 41-46.

Sonia Chiasson, Elizabeth Stobert, Alain Forget, Robert Biddle, P. C. van Oorschot. (2007), "Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledgebase authentication mechanism", IEEE Trans, 2(9). Ahmet Emir Dirik, Nasir Memon and

Jean-Camille Birget. (July 2007), “Modeling user choice in the PassPoints graphical password scheme”, Symposium on Usable Privacy and Security 2007. USA :Pittsburgh, Pennsylvania,. ACM. 20-28.

L.Sobrado and J.-C. Birget(. 2002) "Graphical passwords”, The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research, 4(1).

S. Wiedenbeck, J. Waters, J. C. Birget (2005.), A. Brodskiy, and N. Memon, "Authentication using graphical passwords: Effects of tolerance and image choice," in Symposium on Usable Privacy and Security (SOUPS). Pittsburgh:Carnegie-Mellon University.

D. Nali and J. Thorpe (May 2004), "Analyzing User Choice in Graphical Passwords," Technical Report, School of Information Technology and Engineering, Canada: University of Ottawa.

Downloads

Published

2019-05-17

How to Cite

Saha, H., Saha, G. C., H, R., & Islsam, Z. (2019). User Authentication Through Cued Click Points Based Graphical Password. American Journal of Agricultural Science, Engineering, and Technology, 3(1), 10–24. https://doi.org/10.54536/ajaset.v3i1.38