User authentication by secured graphical password implementation

被引:0
作者
Bandyopadhyay, Samir Kumar [1 ]
Bhattacharyya, Debnath [2 ]
Das, Poulami [2 ]
机构
[1] Univ Calcutta, Dept Comp Sci & Engn, Senate House,87-1 Coll St, Kolkata 700073, W Bengal, India
[2] Heritage Inst Technol, Dept Comp Sci & Engn, Kolkata 700107, India
来源
2008 7TH ASIA-PACIFIC SYMPOSIUM ON INFORMATION AND TELECOMMUNICATION TECHNOLOGIES | 2008年
关键词
security; authentication; biometric; graphical; challenge set and multigrid;
D O I
10.1109/APSITT.2008.4653531
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Most common computer authentication method is traditional 'User Name' and 'password'. There are numerous Biometric authentication methods also proposed. In this paper, we propose a novel and new alternative; Figure as a Password. In this scheme users will get complete freedom to select their Passwords. In this paper, we conduct an extensive survey of the existing graphical password schemes and propose an alternate scheme. Entire work can be divided into three phases- a. sampling of users passwords, processing and storage; b. security on transmission; and c. Recognition and authentication. Our scheme supports the application environment and we strongly believe that "User Authentication by Secured Graphical Password Implementation" could be a solid platform for future research and study.
引用
收藏
页码:7 / +
页数:3
相关论文
共 18 条
  • [1] ALSULAIMAN FA, 2006, VECIMS 2006
  • [2] Bandyopadhyay Samir Kumar, 2006, ACM UBIQUITY, V7
  • [3] BANDYOPADHYAY SK, 2007, IEEE CS P SEOUL 26 2
  • [4] BANDYOPADHYAY SK, 2007, IWAIT 2007 C P BANGK, P110
  • [5] BANDYOPADHYAY SK, 2007, P INT MULTICONFERENC, V2, P1883
  • [6] BIRGET JC, 2006, IEEE T INFORM FORENS, V1
  • [7] Dhamija R., 2000, 9 USENIX SEC S
  • [8] GOLDBERG J, 2002, CHI 02 EXT ABSTR HUM
  • [9] Jermyn I., 1999, 8 USENIX SEC S
  • [10] KU WC, P IEEE C LOC COMP NE