A Graphical Password Scheme Based on Rounded Image Selection

被引:1
作者
Qin, Xinyuan [1 ]
Li, Wenjuan [1 ]
机构
[1] Hong Kong Polytech Univ, Dept Elect & Informat Engn, Hong Kong, Peoples R China
来源
SCIENCE OF CYBER SECURITY, SCISEC 2023 | 2023年 / 14299卷
关键词
Graphical Password; Password Security; Usability; Shoulder-surfing Attack; User Authentication; Image Selection; USAGE ANALYSIS; AUTHENTICATION; SECURITY; DESIGN; ATTACK; TOUCH;
D O I
10.1007/978-3-031-45933-7_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Graphical password is considered as an alternative to traditional textual password, but it also faces many threats such as shoulder-surfing attack. To design and build a more secure and robust graphical password system with the resistance to multiple attacks modalities, especially brute force attack, guessing attack and shoulder-surfing attack, it is important to avoid the credentials being captured in just one step, e.g., by adding several rounds of input. For example, with respect to shoulder-surfing attack resistance, the input design ought to incorporate a certain degree of fault tolerance, with the specific value determined based on the acceptable tolerance range. By integrating this fault tolerance characteristic, the system can effectively withstand shoulder-surfing attacks while preserving the integrity of the authentication procedure. In this work, we learn from the current literature and design a graphical password scheme based on rounded image selection (e.g., three rounds). We provide a detailed scheme design and perform a performance analysis via a user study. Our results indicate that our proposed scheme is viable and gets credit from the participants.
引用
收藏
页码:97 / 114
页数:18
相关论文
共 47 条
[21]   Exploring Effect of Location Number on Map-Based Graphical Password Authentication [J].
Meng, Weizhi ;
Lee, Wang Hao ;
Au, Man Ho ;
Liu, Zhe .
INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 :301-313
[22]   Evaluating the Impact of Juice Filming Charging Attack in Practical Environments [J].
Meng, Weizhi ;
Lee, Wang Hao ;
Liu, Zhe ;
Su, Chunhua ;
Li, Yan .
INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017, 2018, 10779 :327-338
[23]   Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones [J].
Meng, Weizhi ;
Li, Wenjuan ;
Kwok, Lam-For ;
Choo, Kim-Kwang Raymond .
COMPUTERS & SECURITY, 2017, 65 :213-229
[24]   On Multiple Password Interference of Touch Screen Patterns and Text Passwords [J].
Meng, Weizhi ;
Li, Wenjuan ;
Jiang, Lijun ;
Meng, Liying .
34TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, CHI 2016, 2016, :4818-4822
[25]   TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones [J].
Meng, Weizhi ;
Li, Wenjuan ;
Wong, Duncan S. ;
Zhou, Jianying .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 :629-647
[26]   Evaluating the effect of multi-touch behaviours on Android unlock patterns [J].
Meng, Weizhi .
INFORMATION AND COMPUTER SECURITY, 2016, 24 (03) :277-287
[27]   Surveying the Development of Biometric User Authentication on Mobile Phones [J].
Meng, Weizhi ;
Wong, Duncan S. ;
Furnell, Steven ;
Zhou, Jianying .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03) :1268-1293
[28]  
Meng Y., 2012, P RACS, P322
[29]  
Meng YX, 2013, IFIP ADV INF COMM TE, V405, P55
[30]   PICTORIAL SUPERIORITY EFFECT [J].
NELSON, DL ;
REED, VS ;
WALLING, JR .
JOURNAL OF EXPERIMENTAL PSYCHOLOGY-HUMAN LEARNING AND MEMORY, 1976, 2 (05) :523-528