Survey on Various Techniques of User Authentication and Graphical Password
Miss. Saraswati B. Sahu , Associate Prof. Angad Singh. "Survey on Various Techniques of User Authentication and Graphical Password". International Journal of Computer Trends and Technology (IJCTT) V16(3):98-102, Oct 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
The process of identifying an individual usually based on a username and password. Passwords are the best commonly used method for identifying users in computer and communication systems. Usually, passwords are strings of letters and digits, i.e., they are alpha-numeric. Graphical passwords, which contain of some actions that the user accomplishes on an image.In this paper we make a survey of the basic authentication and its techniques. Survey of various techniques for authentication and password Security in a Video CAPTCHA, Persuasive Cued Click-Points Knowledge-Based Authentication Mechanism
References
[1] Suo, Xiaoyuan, "A Design and Analysis of Graphical ZPassword" (2006). Computer Science Theses. Paper 27. A. C. L. Andrew S. Patrick, Scott Flinn.
[2] "HCI and Security Systems," in CHI, Extended Abstracts (Workshops). Ft. Lauderdale, Florida, USA., 2003. [3] “Authentication Methods and Techniques”, Christopher Mallow.
[4] ISO-InternationalOrganization for standardization, http://www.iso.org/iso/catalogue_detail.htm?csnumber=1688,Accessed on July 2009.
[5] S. Chiasson, A. Forget, R. Biddle, and P. van Oorschot, “Influencing Users towards Better Passwords: Persuasive Cued Click-Points,” Proc. British HCI Group Ann. Conf. People and Computers:Culture, Creativity, Interaction, Sept. 2008.
[6] S. Chiasson, A. Forget, E. Stobert, P. van Oorschot, and R. Biddle, “Multiple Password Interference in Text and Click-Based Graphical Passwords,” Proc. ACM Conf. Computer and Comm. Security(CCS), Nov. 2009.
XiaoyuanSuo, Ying Zhu and G. Scott. Owen. “Graphical passwords: a survey,” Proceedings of the 21st Annual Computer Security Applications. 2005, 463-472.
[7] L. Jones, A. Anton, and J. Earp, “Towards Understanding User Perceptions of Authentication Technologies,” Proc. ACM Workshop Privacy in ElectronicSoc., 2007.
[8] L. O?Gorman, “Comparing Passwords, Tokens, and Biometrics for User Authentication,” Proc. IEEE, vol. 91, no. 12, pp. 2019-2020, Dec. 2003.
[9] Jain, A. Ross, and S. Pankanti, “Biometrics: A Tool for Information Security,” IEEE Trans. Information Forensics and Security (TIFS), vol. 1, no. 2, pp.125-143, June 2006.
[10] A. De Angeli, L. Coventry, G. Johnson, and K. Renaud, “Is a Picture Really Worth a Thousand Words? Exploring the Feasibility of GraphicalAuthentication Systems,” Int?l J. Human-Computer Studies, vol. 63, nos. 1/2, pp. 128-152, 2005.
[11] E. Tulving and Z. Pearlstone, “Availability versus Accessibility of Information in Memory for Words,” J. Verbal Learning and Verbal Behavior, vol. 5, pp.381-391, 1966.
[12] S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, “PassPoints: Design and Longitudinal Evaluation of a Graphical Password System,”Int?l J. Human-Computer Studies, vol. 63, nos. 1/2, pp. 102-127, 2005.
[13] S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, “Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice,”Proc. First Symp. Usable Privacy and Security (SOUPS), July 2005.
[14] S. Chiasson, R. Biddle, and P. van Oorschot, “A Second Look at the Usability of Click-Based Graphical Passwords,” Proc. ACM Symp. Usable Privacyand Security (SOUPS), July 2007.
[15] Golofit, K. Click Passwords Under Investigation. ESORICS 2007. LNCS 4734, 343-358, 2007.
[16] Thorpe, J. and van Oorschot, P.C. Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. USENIX Security Symp. 2007.
[17] Wiedenbeck, S., Birget, J.C., Brodskiy, A., and Memon, N. Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice. Symp. OnUsable Privacy and Security (SOUPS) 2005.
[18] S. Chiasson, P. van Oorschot, and R. Biddle, “Graphical Password Authentication Using Cued Click Points,” Proc. European Symp. Research in ComputerSecurity (ESORICS), pp. 359-374, Sept. 2007.
[19] P. Dunphy, J. Nicholson, and P. Olivier, “Securing Passfaces for Description,” Proc. Fourth ACM Symp. Usable Privacy and Security (SOUPS), July 2008.
[20] J. Wolf, “Visual Attention,” Seeing, K. De Valois, ed., pp. 335-386, Academic Press, 2000.
[21] D. Davis, F. Monrose, and M. Reiter, “On User Choice inGraphical Password Schemes,” Proc. 13th USENIX Security Symp, 2004.
[22] M. Cha, H. Kwak, P. Rodriguez, Y.-Y. Ahn, and S. Moon. ITube, You Tube, Everybody Tubes: Analyzing the World’sLargest User Generated Content Video System. In Proc. IMC2007, ACM Press (2007), 1–14.
[23] A. Rusu. Exploiting the Gap in Human and Machine Abilitiesin Handwriting Recognition for Web Security Applications.PhD thesis, University of New York at Buffalo, 2007.
[24] L. von Ahn, M. Blum, and J. Langford. Telling Humans and Computers Apart Automatically. Communications of the ACM 47, 2 (2004), 56–60.
[25] G. Kochanski, D. P. Lopresti and C. Shih. Using a Text-to-Speech Synthesizer to Generate a Reverse Turing Test. In Proc. ICTAI 2003, IEEE Press (2003), 226-232.
[26] A. Kerckhoffs. La CryptographieMilitaire. Journal des Sciences Militaires 9, (1883), 161–191.
[27] “Enhanced Knowledge Based Authentication Using Iterative Session Parameters”, Ali Alkhalifah, Geoff D.Skinner, World Academy of Science, Engineering and Technology 47 2010
[28] R. Dhamija and A. Perrig, "Deja Vu: A User Study Using Images for Authentication," in Proceedings of 9th USENIX Security Symposium, 2000.
[29] A. Perrig and D. Song, "Hash Visualization: A New Technique to Improve Real-World Security," in Proceedings of the 1999 International Workshop on Cryptographic Techniques and E-Commerce, 1999
[30] D. Weinshall and S. Kirkpatrick, "Passwords You’ll Never Forget, but Can’t Recall," in Proceedings of Conference on Human Factors in Computing Systems (CHI). Vienna, Austria: ACM, 2004, pp. 1399-1402.
[31] I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A.D. Rubin, "The Design and Analysis of Graphical Passwords," in Proceedings of the 8th USENIX Security Symposium, 2012
[32] G. E. Blonder, "Graphical passwords," in Lucent Technologies, Inc., Murray Hill, NJ, U. S. Patent, Ed. United States, 2009
Keywords
Graphical password Authentication, Knowledge-Based Authentication Security, CAPTCHA, Persuasive Cued Click-Points