Graphical password: prevent shoulder-surfing attack using digraph substitution rules

被引:15
作者
Por, Lip Yee [1 ]
Ku, Chin Soon [1 ,2 ]
Islam, Amanul [1 ]
Ang, Tan Fong [1 ]
机构
[1] Univ Malaya, Dept Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
[2] Univ Tunku Abdul Rahman, Dept Comp Sci, Jalan Univ, Kampar 31900, Malaysia
关键词
graphical password; authentication; shoulder-surfing; data and computer security; digraph substitution rules; STEGANOGRAPHY; IMAGE;
D O I
10.1007/s11704-016-5472-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a new scheme that uses digraph substitution rules to conceal the mechanism or activity required to derive password-images is proposed. In the proposed method, a user is only required to click on one of the pass-image instead of both pass-images shown in each challenge set for three consecutive sets.While this activity is simple enough to reduce login time, the images clicked appear to be random and can only be obtained with complete knowledge of the registered password along with the activity rules. Thus, it becomes impossible for shoulder-surfing attackers to obtain the information about which password images and pass-images are used by the user. Although the attackers may know about the digraph substitution rules used in the proposed method, the scenario information used in each challenge set remains. User study results reveal an average login process of less than half a minute. In addition, the proposed method is resistant to shoulder-surfing attacks.
引用
收藏
页码:1098 / 1108
页数:11
相关论文
共 25 条
  • [1] Graphical Passwords: Learning from the First Twelve Years
    Biddle, Robert
    Chiasson, Sonia
    Van Oorschot, P. C.
    [J]. ACM COMPUTING SURVEYS, 2012, 44 (04)
  • [2] Davis D, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, P151
  • [3] Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems
    De Angeli, A
    Coventry, L
    Johnson, G
    Renaud, K
    [J]. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2005, 63 (1-2) : 128 - 152
  • [4] Advances in cryptography and information security-introduction of 2002-2006 progress of SKLOIS
    Feng D.
    Wu C.
    [J]. Frontiers of Computer Science in China, 2007, 1 (4): : 385 - 396
  • [5] Forget A, 2010, CHI2010: PROCEEDINGS OF THE 28TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, P1107
  • [6] On cross-correlation indicators of an S-box
    Gao, Sheng
    Ma, Wenping
    Zhuo, Zepeng
    Wang, Fenghe
    [J]. FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2011, 5 (04): : 448 - 453
  • [7] Haichang Gao, 2013, Journal of Software, V8, P1678, DOI 10.4304/jsw.8.7.1678-1698
  • [8] Haichang Gao, 2009, 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC 2009), P675, DOI 10.1109/ICICIC.2009.158
  • [9] Herley C, 2009, P 13 INT C FIN CRYPT, P23
  • [10] Ion I., 2015, 11 S US PRIV SEC SOU, P327