Investigating the Viability of Multifactor Graphical Passwords for User Authentication

被引:1
作者
Jali, Mohd Zalisham [1 ]
Furnell, Steven M. [2 ,3 ]
Dowland, Paul S. [2 ]
机构
[1] USIM, Fac Sci Technol, Bandar Baru Nilai 71800, Negeri Sembilan, Malaysia
[2] Univ Plymouth, Ctr Secur Commun & Network Res CSCAN, Plymouth, Devon, England
[3] Edith Cowan Univ, Sch Comp & Secur Sci, Perth, WA, Australia
来源
INFORMATION SECURITY JOURNAL | 2014年 / 23卷 / 1-2期
关键词
authentication; graphical passwords; knowledge-based authentication; security; usability;
D O I
10.1080/19393555.2014.891274
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication using images (i.e., graphical passwords) is claimed to be one of the alternatives for overcoming weaknesses in the traditional username and password authentication. This paper reports on the study to explore the feasibility of combining two graphical password methods for better security. A graphical password prototype scheme, the Enhanced Graphical Authentication System (EGAS), was developed (which combines the methods of clicking on the image (i.e., click-based) and selecting a series of images (i.e., choice-based). The EGAS was tested by 30 participants randomly chosen from the authors' university and two evaluations were made; namely user performance of the combined method and the feasibility of authentication strategies toward the introduced method itself. From both evaluations, it is found that positive results have been obtained, which suggest that these methods could be combined together effectively without giving impediment to users.
引用
收藏
页码:10 / 21
页数:12
相关论文
共 16 条
  • [1] [Anonymous], 2006, 2828 RFC
  • [2] Brostoff S, 2000, BCS CONFERENCE S, P405
  • [3] Charruau D., 2005, ISONEWORLD 0330
  • [4] Chiasson S., 2007, ESORICS 2007 12 EUR
  • [5] Chiasson S., 2007, P 3 S US PRIV SEC
  • [6] Chiasson S., 2008, P 22 BRIT HCI GROUP, VI
  • [7] Davies D. R., 2004, Proceedings of the Society of Feed Technologists, 2003, P1
  • [8] De Angeli A, 2003, CONTEMPORARY ERGONOMICS 2003, P253
  • [9] Harada A, 2006, LECT NOTES COMPUT SC, V3853, P338
  • [10] Assessing image-based authentication techniques in a web-based environment
    Jali M.Z.
    Furnell S.M.
    Dowland P.S.
    [J]. Information Management and Computer Security, 2010, 18 (01): : 43 - 53