skip to main content
10.1145/2663761.2664194acmconferencesArticle/Chapter ViewAbstractPublication PagesracsConference Proceedingsconference-collections
research-article

Implicit graphical password mutual authentication using mirror-image encryption

Published:05 October 2014Publication History

ABSTRACT

User authentication is the most fundamental decision in designing secure systems and to organize majority of the attacks. Though alpha-numeric password and biometric based authentication methods are the most popular methods till date, they have been exposed to numerous attacks. As an alternative solution, various graphical-based password authentication schemes have been proposed. The efficiency of a graphical password is evaluated by its intensity of security and usability. Regardless of being many existing methods most were unsuccessful to accomplish both features concurrently. In this paper, we propose recognition based mutual authentication method with mirror-image encryption technique, based on images and text. The goal of this paper is to emphasize the enhancements on security and usability of existing graphical password schemes. The proposed method is resistant to most of existing attacks such as shoulder-surfing, secret camera etc.

References

  1. Dey, S., Sampalli, S., & Ye, Q. 2013. Message digest as authentication entity for mobile cloud computing. In IPCCC (pp. 1--6).Google ScholarGoogle Scholar
  2. Confident Technologies, FINAL whitepaper: When Passwords Aren't Enough.Google ScholarGoogle Scholar
  3. Adams, A., & Sasse, M. A. 1999. Users are not the enemy. Communications of the ACM, 42(12), 40--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Matyáš, V., & Říha, Z. (2002). Biometric authentication---security and usability. In Advanced Communications and Multimedia Security (pp. 227--239). Springer US. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Almuairfi, S., Veeraraghavan, P., & Chilamkurti, N. 2013. A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices. Mathematical and Computer Modelling, 58(1), 108--116.Google ScholarGoogle ScholarCross RefCross Ref
  6. Wiedenbeck, S., Waters, J., Birget, J. C., Brodskiy, A., & Memon, N. (2005, July). Authentication using graphical passwords: effects of tolerance and image choice. In Proceedings of the 2005 symposium on Usable privacy and security(pp. 1--12). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Stobert, E., & Biddle, R. 2013. Memory retrieval and graphical passwords. In Proceedings of the Ninth Symposium on Usable Privacy and Security (p. 15). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Lashkari, A. H., Gani, A., Sabet, L. G., & Farm, S. 2010. A new algorithm on Graphical User Authentication (GUA) based on multi-line grids. Scientific Research and Essays, 5(24), 3865--3875.Google ScholarGoogle Scholar
  9. Jermyn, I., Mayer, A. J., Monrose, F., Reiter, M. K., & Rubin, A. D. 1999. The Design and Analysis of Graphical Passwords. In Usenix Security. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Suo, X., Zhu, Y., & Owen, G. S. 2005. Graphical passwords: A survey. In Computer security applications conference, 21st annual (pp. 10--pp). IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. G. E. Blonder, Graphical passwords, in United States Patent, vol. 5559961, 1996.Google ScholarGoogle Scholar
  12. Takada, T., & Koike, H. 2003. Awase-E: Image-based authentication for mobile phones using user's favorite images. In Human-computer interaction with mobile devices and services (pp. 347--351). Springer Berlin Heidelberg.Google ScholarGoogle Scholar
  13. Farnaz Towhindi and Azizah Abdul Manafi, An Enhancement on Paasface Graphical Password Authentication, Universiti Technology Malaysia (UTM), J. Basic. Appl. Sci. Res., 3(2)135--141, 2013.Google ScholarGoogle Scholar
  14. Davis, D., Monrose, F., & Reiter, M. K. 2004. On User Choice in Graphical Password Schemes. In USENIX Security Symposium (Vol. 13, pp. 11--11). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Meng, Y. (2012, June). Designing click-draw based graphical password scheme for better authentication. In Networking, Architecture and Storage (NAS), 2012 IEEE 7th International Conference on (pp. 39--48). IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Golofit, K. (2007). Click passwords under investigation. In Computer Security-ESORICS 2007 (pp. 343--358). Springer Berlin Heidelberg. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Nali, D., & Thorpe, J. (2004). Analyzing user choice in graphical passwords. School of Computer Science, Carleton University, Tech. Rep. TR-04-01.Google ScholarGoogle Scholar
  18. Ugochukwu, E. E. K., & Jusoh, Y. Y. 2013. A review on the graphical user authentication algorithm: recognition-based and recall-based. International Journal of Information Processing and Management, 4(3), 238--252.Google ScholarGoogle ScholarCross RefCross Ref
  19. Biddle, R., Chiasson, S., & Van Oorschot, P. C. 2012. Graphical passwords: Learning from the first twelve years. ACM Computing Surveys (CSUR), 44(4), 19. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Implicit graphical password mutual authentication using mirror-image encryption

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                RACS '14: Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems
                October 2014
                386 pages
                ISBN:9781450330602
                DOI:10.1145/2663761

                Copyright © 2014 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 5 October 2014

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                RACS '14 Paper Acceptance Rate59of251submissions,24%Overall Acceptance Rate393of1,581submissions,25%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader