SlideShare a Scribd company logo
1 of 3
Download to read offline
A Graphical Password Authentication System

                                               Ahmad Almulhem
                                        Computer Engineering Department
                                  King Fahd University of Petroleum and Minerals
                                             Dhahran, Saudi Arabia
                                            ahmadsm@kfupm.edu.sa


                         Abstract                                         In this extended abstract, we propose a graphical pass-
                                                                       word authentication system. The system combines graph-
   Graphical passwords provide a promising alternative to              ical and text-based passwords trying to achieve the best
traditional alphanumeric passwords. They are attractive                of both worlds. In section 2, we provide a brief review
since people usually remember pictures better than words.              of graphical passwords. Then, the proposed system is de-
In this extended abstract, we propose a simple graphical               scribed in section 3. In section 4, we briefly discuss imple-
password authentication system. We describe its operation              mentation and highlight some aspects about the proposed
with some examples, and highlight important aspects of the             system.
system.
                                                                       2 Graphical Passwords
                                                                           Graphical passwords refer to using pictures (also draw-
1 Introduction                                                         ings) as passwords. In theory, graphical passwords are eas-
                                                                       ier to remember, since humans remember pictures better
   User authentication is a fundamental component in most              than words [8]. Also, they should be more resistant to brute-
computer security contexts. It provides the basis for access           force attacks, since the search space is practically infinite.
control and user accountability [1]. While there are var-                  In general, graphical passwords techniques are classi-
ious types of user authentication systems, alphanumerical              fied into two main categories: recognition-based and recall-
username/passwords are the most common type of user au-                based graphical techniques [7]. In recognition-based tech-
thentication. They are versatile and easy to implement and             niques, a user is authenticated by challenging him/her to
use.                                                                   identify one or more images he or she chooses during the
   Alphanumerical passwords are required to satisfy two                registration stage. In recall-based techniques, a user is asked
contradictory requirements. They have to be easily remem-              to reproduce something that he or she created or selected
bered by a user, while they have to be hard to guess by                earlier during the registration stage.
impostor [2]. Users are known to choose easily guessable                   Passfaces is a recognition-based technique, where a user
and/or short text passwords, which are an easy target of dic-          is authenticated by challenging him/her into recognizing
tionary and brute-forced attacks [3, 4, 5]. Enforcing a strong         human faces [9]. An early recall-based graphical password
password policy sometimes leads to an opposite effect, as              approach was introduced by Greg Blonder in 1996 [10].
a user may resort to write his or her difficult-to-remember             In this approach, a user create a password by clicking on
passwords on sticky notes exposing them to direct theft.               several locations on an image. During authentication, the
   In the literature, several techniques have been proposed            user must click on those locations. PassPoints builds on
to reduce the limitations of alphanumerical password. One              Blonders idea, and overcomes some of the limitations of his
proposed solution is to use an easy to remember long                   scheme [2]. Several other approaches have been surveyed
phrases (passphrase) rather than a single word [6]. Another            in the following paper [7].
proposed solution is to use graphical passwords, in which
graphics (images) are used instead of alphanumerical pass-             3 Proposed System
words [7]. This can be achieved by asking the user to select
regions from an image rather than typing characters as in                 The proposed authentication system works as follows.
alphanumeric password approaches.                                      At the time of registration, a user creates a graphical pass-




     978-0-9564263-7/6/$25.00©2011 IEEE                          223
word by first entering a picture he or she chooses. The user
then chooses several point-of-interest (POI) regions in the
picture. Each POI is described by a circle (center and ra-
dius). For every POI, the user types a word or phrase that
would be associated with that POI. If the user does not type
any text after selecting a POI, then that POI is associated
with an empty string. The user can choose either to enforce
the order of selecting POIs (stronger password), or to make
the order insignificant.
   In Figure 1, we show an example of a user creating a
graphical password. In this example, the user chooses a
picture of his or her kids by pressing “Load Image button”.
Then the user clicks on the kids faces in the order of their
ages (order is enforced). For each selected region, the user
types the kid’s name or nickname.



                                                                                     Figure 2. Login Screen



                                                                        In the proposed system, a user freely chooses a picture,
                                                                     POIs and corresponding words. The order and number of
                                                                     POIs can be enforced for stronger authentication. Together,
                                                                     these parameters allow for a very large password space.
                                                                        We believe that proposed approach is promising and
                                                                     unique for at least two reasons:

                                                                       • It combines graphical and text-based passwords trying
                                                                         to achieve the best of both worlds.
   Figure 1. An example of creating a graphical
   password using the proposed system.                                 • It provides multi-factor authentication (graphical, text,
                                                                         POI-order, POI-number) in a friendly intuitive system.


   For authentication, the user first enters his or her user-         5 Conclusion
name. The system, then, displays the registered picture.
The user, then, has to correctly pick the POIs and type                 User authentication is a fundamental component in most
the associated words. At any time, typed words are either            computer security contexts. In this extended abstract, we
shown as asterisks (*) or hidden. In Figure 2, we show an            proposed a simple graphical password authentication sys-
example of the login screen.                                         tem. The system combines graphical and text-based pass-
                                                                     words trying to achieve the best of both worlds. It also
4 Implementation and Discussion                                      provides multi-factor authentication in a friendly intuitive
                                                                     system. We described the system operation with some ex-
   The proposed system was implemented using Visual Ba-              amples, and highlighted important aspects of the system.
sic .net 2005 (VB.net). The implementation has three main
classes:

  • LoginInfo: Contains username, graphical password,
    and related methods.                                             6 References
  • GraphicalPassword: Contains graphical password in-
    formation and related methods.                                    [1] William Stallings and Lawrie Brown. Computer Se-
                                                                          curity: Principle and Practices. Pearson Education,
  • SelReg: Contains fields about selected regions (POIs).                 2008.




     978-0-9564263-7/6/$25.00©2011 IEEE                        224
[2] Susan Wiedenbeck, Jim Waters, Jean-Camille Birget,
     Alex Brodskiy, and Nasir Memon. Passpoints: design
     and longitudinal evaluation of a graphical password
     system. International Journal of Human-Computer
     Studies, 63:102–127, July 2005.
 [3] Robert Morris and Ken Thompson. Password security:
     a case history. Communications of the ACM, 22:594–
     597, November 1979.
 [4] Daniel V. Klein. Foiling the Cracker: A Survey of, and
     Improvements to, Password Security. In Proceedings
     of the 2nd USENIX UNIX Security Workshop, 1990.
 [5] Eugene H. Spafford. Observing reusable password
     choices. In Proceedings of the 3rd Security Sympo-
     sium. Usenix, pages 299–312, 1992.
 [6] Sigmund N. Porter. A password extension for im-
     proved human factors. Computers & Security, 1(1):54
     – 56, 1982.
 [7] Xiaoyuan Suo, Ying Zhu, and G. Scott Owen. Graph-
     ical passwords: A survey. In Proceedings of Annual
     Computer Security Applications Conference, pages
     463–472, 2005.
 [8] Antonella De Angeli, Lynne Coventry, Graham John-
     son, and Karen Renaud. Is a picture really worth a
     thousand words? exploring the feasibility of graphi-
     cal authentication systems. International Journal of
     Human-Computer Studies, 63:128–152, July 2005.
 [9] Real User Corporation. The science behind passfaces,
     June 2004.
[10] G. E. Blonder. Graphical password. U.S. Patent
     5559961, Lucent Technologies, Inc. (Murray Hill,
     NJ), August 1995.




     978-0-9564263-7/6/$25.00©2011 IEEE                       225

More Related Content

What's hot

Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its UsesMohsin Ali
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorNitesh Kumar
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)Soham Kansodaria
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationShobha Rani
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmIAEME Publication
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701Amit Pathak
 
Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network securityNEHA PATEL
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptographyzahid-mian
 
Authentication Protocols
Authentication ProtocolsAuthentication Protocols
Authentication ProtocolsTrinity Dwarka
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Hardik Manocha
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 

What's hot (20)

Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
ch14.ppt
ch14.pptch14.ppt
ch14.ppt
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Cryptography
CryptographyCryptography
Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
AES.ppt
AES.pptAES.ppt
AES.ppt
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network security
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Authentication Protocols
Authentication ProtocolsAuthentication Protocols
Authentication Protocols
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 

Viewers also liked

Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbhijit Akotkar
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsHari Krishnan
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationanilaja
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User AuthenticationSarthak Gupta
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Raghu Vamsy Sirasala
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of soundVikram Verma
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by sureshsuresh5c2
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Umesh Kumar
 
Graphical password
Graphical passwordGraphical password
Graphical passwordsowji888
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text IOSR Journals
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Kailas Patil
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Alexander Decker
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureeSAT Journals
 
Screenless displays seminar report
Screenless displays seminar reportScreenless displays seminar report
Screenless displays seminar reportJeevan Kumar D
 
screen less display documentation
screen less display documentationscreen less display documentation
screen less display documentationmani akuthota
 

Viewers also liked (20)

Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of sound
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
Ethical hacking.
Ethical hacking.Ethical hacking.
Ethical hacking.
 
Screenless displays seminar report
Screenless displays seminar reportScreenless displays seminar report
Screenless displays seminar report
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
screen less display documentation
screen less display documentationscreen less display documentation
screen less display documentation
 

Similar to Graphical Password System Combines Visual & Text Authentication

2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password schemeIAEME Publication
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationIRJET Journal
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemIJNSA Journal
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011prasanna9
 
Ipas implicit password_authentication_system
Ipas implicit password_authentication_systemIpas implicit password_authentication_system
Ipas implicit password_authentication_systemSameer Dighe
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...IOSR Journals
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishnabanda5630
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsIJMER
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...IOSR Journals
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationeSAT Publishing House
 
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDSUSER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDSIJNSA Journal
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...IJCSIS Research Publications
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...eSAT Publishing House
 
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesIJNSA Journal
 
graphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfgraphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfKumudhaKumar1
 

Similar to Graphical Password System Combines Visual & Text Authentication (20)

finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password System
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
 
Ipas implicit password_authentication_system
Ipas implicit password_authentication_systemIpas implicit password_authentication_system
Ipas implicit password_authentication_system
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDSUSER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
 
Jc2516111615
Jc2516111615Jc2516111615
Jc2516111615
 
Jc2516111615
Jc2516111615Jc2516111615
Jc2516111615
 
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
 
graphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfgraphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdf
 

Recently uploaded

Resultados del Campeonato mundial de Marcha por equipos Antalya 2024
Resultados del Campeonato mundial de Marcha por equipos Antalya 2024Resultados del Campeonato mundial de Marcha por equipos Antalya 2024
Resultados del Campeonato mundial de Marcha por equipos Antalya 2024Judith Chuquipul
 
Technical Data | ThermTec Wild 650L | Optics Trade
Technical Data | ThermTec Wild 650L | Optics TradeTechnical Data | ThermTec Wild 650L | Optics Trade
Technical Data | ThermTec Wild 650L | Optics TradeOptics-Trade
 
JORNADA 4 LIGA MURO 2024TUXTEPEC1234.pdf
JORNADA 4 LIGA MURO 2024TUXTEPEC1234.pdfJORNADA 4 LIGA MURO 2024TUXTEPEC1234.pdf
JORNADA 4 LIGA MURO 2024TUXTEPEC1234.pdfArturo Pacheco Alvarez
 
France's UEFA Euro 2024 Ambitions Amid Coman's Injury.docx
France's UEFA Euro 2024 Ambitions Amid Coman's Injury.docxFrance's UEFA Euro 2024 Ambitions Amid Coman's Injury.docx
France's UEFA Euro 2024 Ambitions Amid Coman's Injury.docxEuro Cup 2024 Tickets
 
Dubai Call Girls Bikni O528786472 Call Girls Dubai Ebony
Dubai Call Girls Bikni O528786472 Call Girls Dubai EbonyDubai Call Girls Bikni O528786472 Call Girls Dubai Ebony
Dubai Call Girls Bikni O528786472 Call Girls Dubai Ebonyhf8803863
 
Expert Pool Table Refelting in Lee & Collier County, FL
Expert Pool Table Refelting in Lee & Collier County, FLExpert Pool Table Refelting in Lee & Collier County, FL
Expert Pool Table Refelting in Lee & Collier County, FLAll American Billiards
 
Mysore Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Mysore Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMysore Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Mysore Call Girls 7001305949 WhatsApp Number 24x7 Best Servicesnajka9823
 
Technical Data | ThermTec Wild 335 | Optics Trade
Technical Data | ThermTec Wild 335 | Optics TradeTechnical Data | ThermTec Wild 335 | Optics Trade
Technical Data | ThermTec Wild 335 | Optics TradeOptics-Trade
 
Technical Data | ThermTec Wild 650 | Optics Trade
Technical Data | ThermTec Wild 650 | Optics TradeTechnical Data | ThermTec Wild 650 | Optics Trade
Technical Data | ThermTec Wild 650 | Optics TradeOptics-Trade
 
Call Girls in Dhaula Kuan 💯Call Us 🔝8264348440🔝
Call Girls in Dhaula Kuan 💯Call Us 🔝8264348440🔝Call Girls in Dhaula Kuan 💯Call Us 🔝8264348440🔝
Call Girls in Dhaula Kuan 💯Call Us 🔝8264348440🔝soniya singh
 
Croatia vs Italy UEFA Euro 2024 Croatia's Checkered Legacy on Display in New ...
Croatia vs Italy UEFA Euro 2024 Croatia's Checkered Legacy on Display in New ...Croatia vs Italy UEFA Euro 2024 Croatia's Checkered Legacy on Display in New ...
Croatia vs Italy UEFA Euro 2024 Croatia's Checkered Legacy on Display in New ...Eticketing.co
 
ppt on Myself, Occupation and my Interest
ppt on Myself, Occupation and my Interestppt on Myself, Occupation and my Interest
ppt on Myself, Occupation and my InterestNagaissenValaydum
 
IPL Quiz ( weekly quiz) by SJU quizzers.
IPL Quiz ( weekly quiz) by SJU quizzers.IPL Quiz ( weekly quiz) by SJU quizzers.
IPL Quiz ( weekly quiz) by SJU quizzers.SJU Quizzers
 
Instruction Manual | ThermTec Wild Thermal Monoculars | Optics Trade
Instruction Manual | ThermTec Wild Thermal Monoculars | Optics TradeInstruction Manual | ThermTec Wild Thermal Monoculars | Optics Trade
Instruction Manual | ThermTec Wild Thermal Monoculars | Optics TradeOptics-Trade
 
JORNADA 3 LIGA MURO 2024GHGHGHGHGHGH.pdf
JORNADA 3 LIGA MURO 2024GHGHGHGHGHGH.pdfJORNADA 3 LIGA MURO 2024GHGHGHGHGHGH.pdf
JORNADA 3 LIGA MURO 2024GHGHGHGHGHGH.pdfArturo Pacheco Alvarez
 
Real Moto 2 MOD APK v1.1.721 All Bikes, Unlimited Money
Real Moto 2 MOD APK v1.1.721 All Bikes, Unlimited MoneyReal Moto 2 MOD APK v1.1.721 All Bikes, Unlimited Money
Real Moto 2 MOD APK v1.1.721 All Bikes, Unlimited MoneyApk Toly
 
办理学位证(KCL文凭证书)伦敦国王学院毕业证成绩单原版一模一样
办理学位证(KCL文凭证书)伦敦国王学院毕业证成绩单原版一模一样办理学位证(KCL文凭证书)伦敦国王学院毕业证成绩单原版一模一样
办理学位证(KCL文凭证书)伦敦国王学院毕业证成绩单原版一模一样7pn7zv3i
 
8377087607 ☎, Cash On Delivery Call Girls Service In Hauz Khas Delhi Enjoy 24/7
8377087607 ☎, Cash On Delivery Call Girls Service In Hauz Khas Delhi Enjoy 24/78377087607 ☎, Cash On Delivery Call Girls Service In Hauz Khas Delhi Enjoy 24/7
8377087607 ☎, Cash On Delivery Call Girls Service In Hauz Khas Delhi Enjoy 24/7dollysharma2066
 

Recently uploaded (20)

Resultados del Campeonato mundial de Marcha por equipos Antalya 2024
Resultados del Campeonato mundial de Marcha por equipos Antalya 2024Resultados del Campeonato mundial de Marcha por equipos Antalya 2024
Resultados del Campeonato mundial de Marcha por equipos Antalya 2024
 
Technical Data | ThermTec Wild 650L | Optics Trade
Technical Data | ThermTec Wild 650L | Optics TradeTechnical Data | ThermTec Wild 650L | Optics Trade
Technical Data | ThermTec Wild 650L | Optics Trade
 
JORNADA 4 LIGA MURO 2024TUXTEPEC1234.pdf
JORNADA 4 LIGA MURO 2024TUXTEPEC1234.pdfJORNADA 4 LIGA MURO 2024TUXTEPEC1234.pdf
JORNADA 4 LIGA MURO 2024TUXTEPEC1234.pdf
 
France's UEFA Euro 2024 Ambitions Amid Coman's Injury.docx
France's UEFA Euro 2024 Ambitions Amid Coman's Injury.docxFrance's UEFA Euro 2024 Ambitions Amid Coman's Injury.docx
France's UEFA Euro 2024 Ambitions Amid Coman's Injury.docx
 
Dubai Call Girls Bikni O528786472 Call Girls Dubai Ebony
Dubai Call Girls Bikni O528786472 Call Girls Dubai EbonyDubai Call Girls Bikni O528786472 Call Girls Dubai Ebony
Dubai Call Girls Bikni O528786472 Call Girls Dubai Ebony
 
Expert Pool Table Refelting in Lee & Collier County, FL
Expert Pool Table Refelting in Lee & Collier County, FLExpert Pool Table Refelting in Lee & Collier County, FL
Expert Pool Table Refelting in Lee & Collier County, FL
 
Mysore Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Mysore Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMysore Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Mysore Call Girls 7001305949 WhatsApp Number 24x7 Best Services
 
Technical Data | ThermTec Wild 335 | Optics Trade
Technical Data | ThermTec Wild 335 | Optics TradeTechnical Data | ThermTec Wild 335 | Optics Trade
Technical Data | ThermTec Wild 335 | Optics Trade
 
young Call girls in Moolchand 🔝 9953056974 🔝 Delhi escort Service
young Call girls in Moolchand 🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Moolchand 🔝 9953056974 🔝 Delhi escort Service
young Call girls in Moolchand 🔝 9953056974 🔝 Delhi escort Service
 
Technical Data | ThermTec Wild 650 | Optics Trade
Technical Data | ThermTec Wild 650 | Optics TradeTechnical Data | ThermTec Wild 650 | Optics Trade
Technical Data | ThermTec Wild 650 | Optics Trade
 
Call Girls in Dhaula Kuan 💯Call Us 🔝8264348440🔝
Call Girls in Dhaula Kuan 💯Call Us 🔝8264348440🔝Call Girls in Dhaula Kuan 💯Call Us 🔝8264348440🔝
Call Girls in Dhaula Kuan 💯Call Us 🔝8264348440🔝
 
Croatia vs Italy UEFA Euro 2024 Croatia's Checkered Legacy on Display in New ...
Croatia vs Italy UEFA Euro 2024 Croatia's Checkered Legacy on Display in New ...Croatia vs Italy UEFA Euro 2024 Croatia's Checkered Legacy on Display in New ...
Croatia vs Italy UEFA Euro 2024 Croatia's Checkered Legacy on Display in New ...
 
ppt on Myself, Occupation and my Interest
ppt on Myself, Occupation and my Interestppt on Myself, Occupation and my Interest
ppt on Myself, Occupation and my Interest
 
IPL Quiz ( weekly quiz) by SJU quizzers.
IPL Quiz ( weekly quiz) by SJU quizzers.IPL Quiz ( weekly quiz) by SJU quizzers.
IPL Quiz ( weekly quiz) by SJU quizzers.
 
Instruction Manual | ThermTec Wild Thermal Monoculars | Optics Trade
Instruction Manual | ThermTec Wild Thermal Monoculars | Optics TradeInstruction Manual | ThermTec Wild Thermal Monoculars | Optics Trade
Instruction Manual | ThermTec Wild Thermal Monoculars | Optics Trade
 
JORNADA 3 LIGA MURO 2024GHGHGHGHGHGH.pdf
JORNADA 3 LIGA MURO 2024GHGHGHGHGHGH.pdfJORNADA 3 LIGA MURO 2024GHGHGHGHGHGH.pdf
JORNADA 3 LIGA MURO 2024GHGHGHGHGHGH.pdf
 
Real Moto 2 MOD APK v1.1.721 All Bikes, Unlimited Money
Real Moto 2 MOD APK v1.1.721 All Bikes, Unlimited MoneyReal Moto 2 MOD APK v1.1.721 All Bikes, Unlimited Money
Real Moto 2 MOD APK v1.1.721 All Bikes, Unlimited Money
 
办理学位证(KCL文凭证书)伦敦国王学院毕业证成绩单原版一模一样
办理学位证(KCL文凭证书)伦敦国王学院毕业证成绩单原版一模一样办理学位证(KCL文凭证书)伦敦国王学院毕业证成绩单原版一模一样
办理学位证(KCL文凭证书)伦敦国王学院毕业证成绩单原版一模一样
 
8377087607 ☎, Cash On Delivery Call Girls Service In Hauz Khas Delhi Enjoy 24/7
8377087607 ☎, Cash On Delivery Call Girls Service In Hauz Khas Delhi Enjoy 24/78377087607 ☎, Cash On Delivery Call Girls Service In Hauz Khas Delhi Enjoy 24/7
8377087607 ☎, Cash On Delivery Call Girls Service In Hauz Khas Delhi Enjoy 24/7
 
FULL ENJOY Call Girls In Savitri Nagar (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In  Savitri Nagar (Delhi) Call Us 9953056974FULL ENJOY Call Girls In  Savitri Nagar (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Savitri Nagar (Delhi) Call Us 9953056974
 

Graphical Password System Combines Visual & Text Authentication

  • 1. A Graphical Password Authentication System Ahmad Almulhem Computer Engineering Department King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia ahmadsm@kfupm.edu.sa Abstract In this extended abstract, we propose a graphical pass- word authentication system. The system combines graph- Graphical passwords provide a promising alternative to ical and text-based passwords trying to achieve the best traditional alphanumeric passwords. They are attractive of both worlds. In section 2, we provide a brief review since people usually remember pictures better than words. of graphical passwords. Then, the proposed system is de- In this extended abstract, we propose a simple graphical scribed in section 3. In section 4, we briefly discuss imple- password authentication system. We describe its operation mentation and highlight some aspects about the proposed with some examples, and highlight important aspects of the system. system. 2 Graphical Passwords Graphical passwords refer to using pictures (also draw- 1 Introduction ings) as passwords. In theory, graphical passwords are eas- ier to remember, since humans remember pictures better User authentication is a fundamental component in most than words [8]. Also, they should be more resistant to brute- computer security contexts. It provides the basis for access force attacks, since the search space is practically infinite. control and user accountability [1]. While there are var- In general, graphical passwords techniques are classi- ious types of user authentication systems, alphanumerical fied into two main categories: recognition-based and recall- username/passwords are the most common type of user au- based graphical techniques [7]. In recognition-based tech- thentication. They are versatile and easy to implement and niques, a user is authenticated by challenging him/her to use. identify one or more images he or she chooses during the Alphanumerical passwords are required to satisfy two registration stage. In recall-based techniques, a user is asked contradictory requirements. They have to be easily remem- to reproduce something that he or she created or selected bered by a user, while they have to be hard to guess by earlier during the registration stage. impostor [2]. Users are known to choose easily guessable Passfaces is a recognition-based technique, where a user and/or short text passwords, which are an easy target of dic- is authenticated by challenging him/her into recognizing tionary and brute-forced attacks [3, 4, 5]. Enforcing a strong human faces [9]. An early recall-based graphical password password policy sometimes leads to an opposite effect, as approach was introduced by Greg Blonder in 1996 [10]. a user may resort to write his or her difficult-to-remember In this approach, a user create a password by clicking on passwords on sticky notes exposing them to direct theft. several locations on an image. During authentication, the In the literature, several techniques have been proposed user must click on those locations. PassPoints builds on to reduce the limitations of alphanumerical password. One Blonders idea, and overcomes some of the limitations of his proposed solution is to use an easy to remember long scheme [2]. Several other approaches have been surveyed phrases (passphrase) rather than a single word [6]. Another in the following paper [7]. proposed solution is to use graphical passwords, in which graphics (images) are used instead of alphanumerical pass- 3 Proposed System words [7]. This can be achieved by asking the user to select regions from an image rather than typing characters as in The proposed authentication system works as follows. alphanumeric password approaches. At the time of registration, a user creates a graphical pass- 978-0-9564263-7/6/$25.00©2011 IEEE 223
  • 2. word by first entering a picture he or she chooses. The user then chooses several point-of-interest (POI) regions in the picture. Each POI is described by a circle (center and ra- dius). For every POI, the user types a word or phrase that would be associated with that POI. If the user does not type any text after selecting a POI, then that POI is associated with an empty string. The user can choose either to enforce the order of selecting POIs (stronger password), or to make the order insignificant. In Figure 1, we show an example of a user creating a graphical password. In this example, the user chooses a picture of his or her kids by pressing “Load Image button”. Then the user clicks on the kids faces in the order of their ages (order is enforced). For each selected region, the user types the kid’s name or nickname. Figure 2. Login Screen In the proposed system, a user freely chooses a picture, POIs and corresponding words. The order and number of POIs can be enforced for stronger authentication. Together, these parameters allow for a very large password space. We believe that proposed approach is promising and unique for at least two reasons: • It combines graphical and text-based passwords trying to achieve the best of both worlds. Figure 1. An example of creating a graphical password using the proposed system. • It provides multi-factor authentication (graphical, text, POI-order, POI-number) in a friendly intuitive system. For authentication, the user first enters his or her user- 5 Conclusion name. The system, then, displays the registered picture. The user, then, has to correctly pick the POIs and type User authentication is a fundamental component in most the associated words. At any time, typed words are either computer security contexts. In this extended abstract, we shown as asterisks (*) or hidden. In Figure 2, we show an proposed a simple graphical password authentication sys- example of the login screen. tem. The system combines graphical and text-based pass- words trying to achieve the best of both worlds. It also 4 Implementation and Discussion provides multi-factor authentication in a friendly intuitive system. We described the system operation with some ex- The proposed system was implemented using Visual Ba- amples, and highlighted important aspects of the system. sic .net 2005 (VB.net). The implementation has three main classes: • LoginInfo: Contains username, graphical password, and related methods. 6 References • GraphicalPassword: Contains graphical password in- formation and related methods. [1] William Stallings and Lawrie Brown. Computer Se- curity: Principle and Practices. Pearson Education, • SelReg: Contains fields about selected regions (POIs). 2008. 978-0-9564263-7/6/$25.00©2011 IEEE 224
  • 3. [2] Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy, and Nasir Memon. Passpoints: design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies, 63:102–127, July 2005. [3] Robert Morris and Ken Thompson. Password security: a case history. Communications of the ACM, 22:594– 597, November 1979. [4] Daniel V. Klein. Foiling the Cracker: A Survey of, and Improvements to, Password Security. In Proceedings of the 2nd USENIX UNIX Security Workshop, 1990. [5] Eugene H. Spafford. Observing reusable password choices. In Proceedings of the 3rd Security Sympo- sium. Usenix, pages 299–312, 1992. [6] Sigmund N. Porter. A password extension for im- proved human factors. Computers & Security, 1(1):54 – 56, 1982. [7] Xiaoyuan Suo, Ying Zhu, and G. Scott Owen. Graph- ical passwords: A survey. In Proceedings of Annual Computer Security Applications Conference, pages 463–472, 2005. [8] Antonella De Angeli, Lynne Coventry, Graham John- son, and Karen Renaud. Is a picture really worth a thousand words? exploring the feasibility of graphi- cal authentication systems. International Journal of Human-Computer Studies, 63:128–152, July 2005. [9] Real User Corporation. The science behind passfaces, June 2004. [10] G. E. Blonder. Graphical password. U.S. Patent 5559961, Lucent Technologies, Inc. (Murray Hill, NJ), August 1995. 978-0-9564263-7/6/$25.00©2011 IEEE 225