Pixel Value Graphical Password Scheme: Identifying Design Features and Requirements

Article Preview

Abstract:

Pixel value graphical password scheme was introduced with the aim to solve problems faced by users during authentication process that arising from current graphical password scheme weaknesses. Even though the idea of graphical password scheme is still under analysis stage, many researchers have come out with a lot of vulnerabilities finding for current graphical password scheme. Literature studies on vulnerabilities finding has contributed for a development of method design features and requirements for pixel value graphical password scheme. This paper is organized as begin with a brief introduction on graphical password scheme, followed by literature study outcome, discussion on features and requirements, and enclosed with topic conclusion.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1561-1565

Citation:

Online since:

April 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Dj Biddle, R., Chiasson, S., & Van Oorschot, P. C.: Graphical passwords: Learning from the first twelve years. ACM Computing Surveys (CSUR). (2012).

DOI: 10.1145/2333112.2333114

Google Scholar

[2] Lashkari, A. H., Farmand, S., Zakaria, D., Bin, O., & Saleh, D.: Shoulder Surfing attack in graphical password authentication. arXiv preprint arXiv. (2009).

Google Scholar

[3] Ali Mohamed Eljetlawi, in Dissertation Universiti Teknologi Malaysia, Faculty of Computer Science and Information System, (2008).

Google Scholar

[4] Zhao, H., & Li, X.: S3PAS: A scalable shoulder-surfing resistant textual-graphical password authentication scheme. In Advanced Information Networking and Applications Workshops, 2007, AINAW'07. 21st International Conference (2007).

DOI: 10.1109/ainaw.2007.317

Google Scholar

[5] Xiaoyuan Suo, in Computer Science Theses (2006).

Google Scholar

[6] Wiedenbeck, S., Waters, J., Birget, J. C., Brodskiy, A., and Memon, N.: Authentication using graphical passwords: effects of tolerance and image choice. 2005 symposium on Usable privacy and security, SOUPS '05, (2005).

DOI: 10.1145/1073001.1073002

Google Scholar

[7] Omar Zakaria, Toomaj Zangooei, Mohd Afizi Mohd Shukran, Graphical Password Authentication: Review and Analysis, AISS, Vol. 4, No. 15, p.25 ~ 32, (2012).

Google Scholar

[8] Dhamija, R. and Perrig, A.: Deja vu: A user study using images for authentication. 9th USENIX Security Symposium (2000).

Google Scholar

[9] Omar Zakaria, Toomaj Zangooei, Mohd Afizi Mohd Shukran, Enhancing Mixing Recognition-Based and Recall-Based Approach in Graphical Password Scheme, IJACT, Vol. 4, No. 15, p.189 ~ 197, (2012).

DOI: 10.4156/ijact.vol4.issue15.22

Google Scholar

[10] Jermyn, I., Mayer, A., Monrose, F., Reiter, M. K., & Rubin, A. D.: The design and analysis of graphical passwords. 8th USENIX Security Symposium (1999) pp.1-14.

Google Scholar

[11] BLONDER, G., United States Patent 5559961 (1996).

Google Scholar

[12] M.A.B.M. Shukran, M.S.F.B. M Yunus, K.B. Maskat, W.S.S.B. Shariff, & M.S.B. Ariffin,: Australian Journal of Basic and Applied Sciences, 7(4). (2013) pp.688-695.

Google Scholar