Survey on Various Techniques of User Authentication and Graphical Password
||International Journal of Computer Trends and Technology (IJCTT)|
|© 2014 by IJCTT Journal|
|Year of Publication : 2014|
|Authors : Miss. Saraswati B. Sahu , Associate Prof. Angad Singh|
|DOI : 10.14445/22312803/IJCTT-V16P124|
Miss. Saraswati B. Sahu , Associate Prof. Angad Singh. "Survey on Various Techniques of User Authentication and Graphical Password". International Journal of Computer Trends and Technology (IJCTT) V16(3):98-102, Oct 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
The process of identifying an individual usually based on a username and password. Passwords are the best commonly used method for identifying users in computer and communication systems. Usually, passwords are strings of letters and digits, i.e., they are alpha-numeric. Graphical passwords, which contain of some actions that the user accomplishes on an image.In this paper we make a survey of the basic authentication and its techniques. Survey of various techniques for authentication and password Security in a Video CAPTCHA, Persuasive Cued Click-Points Knowledge-Based Authentication Mechanism
 Suo, Xiaoyuan, "A Design and Analysis of Graphical ZPassword" (2006). Computer Science Theses. Paper 27. A. C. L. Andrew S. Patrick, Scott Flinn.
 "HCI and Security Systems," in CHI, Extended Abstracts (Workshops). Ft. Lauderdale, Florida, USA., 2003.  “Authentication Methods and Techniques”, Christopher Mallow.
 ISO-InternationalOrganization for standardization, http://www.iso.org/iso/catalogue_detail.htm?csnumber=1688,Accessed on July 2009.
 S. Chiasson, A. Forget, R. Biddle, and P. van Oorschot, “Influencing Users towards Better Passwords: Persuasive Cued Click-Points,” Proc. British HCI Group Ann. Conf. People and Computers:Culture, Creativity, Interaction, Sept. 2008.
 S. Chiasson, A. Forget, E. Stobert, P. van Oorschot, and R. Biddle, “Multiple Password Interference in Text and Click-Based Graphical Passwords,” Proc. ACM Conf. Computer and Comm. Security(CCS), Nov. 2009.
XiaoyuanSuo, Ying Zhu and G. Scott. Owen. “Graphical passwords: a survey,” Proceedings of the 21st Annual Computer Security Applications. 2005, 463-472.
 L. Jones, A. Anton, and J. Earp, “Towards Understanding User Perceptions of Authentication Technologies,” Proc. ACM Workshop Privacy in ElectronicSoc., 2007.
 L. O?Gorman, “Comparing Passwords, Tokens, and Biometrics for User Authentication,” Proc. IEEE, vol. 91, no. 12, pp. 2019-2020, Dec. 2003.
 Jain, A. Ross, and S. Pankanti, “Biometrics: A Tool for Information Security,” IEEE Trans. Information Forensics and Security (TIFS), vol. 1, no. 2, pp.125-143, June 2006.
 A. De Angeli, L. Coventry, G. Johnson, and K. Renaud, “Is a Picture Really Worth a Thousand Words? Exploring the Feasibility of GraphicalAuthentication Systems,” Int?l J. Human-Computer Studies, vol. 63, nos. 1/2, pp. 128-152, 2005.
 E. Tulving and Z. Pearlstone, “Availability versus Accessibility of Information in Memory for Words,” J. Verbal Learning and Verbal Behavior, vol. 5, pp.381-391, 1966.
 S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, “PassPoints: Design and Longitudinal Evaluation of a Graphical Password System,”Int?l J. Human-Computer Studies, vol. 63, nos. 1/2, pp. 102-127, 2005.
 S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, “Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice,”Proc. First Symp. Usable Privacy and Security (SOUPS), July 2005.
 S. Chiasson, R. Biddle, and P. van Oorschot, “A Second Look at the Usability of Click-Based Graphical Passwords,” Proc. ACM Symp. Usable Privacyand Security (SOUPS), July 2007.
 Golofit, K. Click Passwords Under Investigation. ESORICS 2007. LNCS 4734, 343-358, 2007.
 Thorpe, J. and van Oorschot, P.C. Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. USENIX Security Symp. 2007.
 Wiedenbeck, S., Birget, J.C., Brodskiy, A., and Memon, N. Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice. Symp. OnUsable Privacy and Security (SOUPS) 2005.
 S. Chiasson, P. van Oorschot, and R. Biddle, “Graphical Password Authentication Using Cued Click Points,” Proc. European Symp. Research in ComputerSecurity (ESORICS), pp. 359-374, Sept. 2007.
 P. Dunphy, J. Nicholson, and P. Olivier, “Securing Passfaces for Description,” Proc. Fourth ACM Symp. Usable Privacy and Security (SOUPS), July 2008.
 J. Wolf, “Visual Attention,” Seeing, K. De Valois, ed., pp. 335-386, Academic Press, 2000.
 D. Davis, F. Monrose, and M. Reiter, “On User Choice inGraphical Password Schemes,” Proc. 13th USENIX Security Symp, 2004.
 M. Cha, H. Kwak, P. Rodriguez, Y.-Y. Ahn, and S. Moon. ITube, You Tube, Everybody Tubes: Analyzing the World’sLargest User Generated Content Video System. In Proc. IMC2007, ACM Press (2007), 1–14.
 A. Rusu. Exploiting the Gap in Human and Machine Abilitiesin Handwriting Recognition for Web Security Applications.PhD thesis, University of New York at Buffalo, 2007.
 L. von Ahn, M. Blum, and J. Langford. Telling Humans and Computers Apart Automatically. Communications of the ACM 47, 2 (2004), 56–60.
 G. Kochanski, D. P. Lopresti and C. Shih. Using a Text-to-Speech Synthesizer to Generate a Reverse Turing Test. In Proc. ICTAI 2003, IEEE Press (2003), 226-232.
 A. Kerckhoffs. La CryptographieMilitaire. Journal des Sciences Militaires 9, (1883), 161–191.
 “Enhanced Knowledge Based Authentication Using Iterative Session Parameters”, Ali Alkhalifah, Geoff D.Skinner, World Academy of Science, Engineering and Technology 47 2010
 R. Dhamija and A. Perrig, "Deja Vu: A User Study Using Images for Authentication," in Proceedings of 9th USENIX Security Symposium, 2000.
 A. Perrig and D. Song, "Hash Visualization: A New Technique to Improve Real-World Security," in Proceedings of the 1999 International Workshop on Cryptographic Techniques and E-Commerce, 1999
 D. Weinshall and S. Kirkpatrick, "Passwords You’ll Never Forget, but Can’t Recall," in Proceedings of Conference on Human Factors in Computing Systems (CHI). Vienna, Austria: ACM, 2004, pp. 1399-1402.
 I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A.D. Rubin, "The Design and Analysis of Graphical Passwords," in Proceedings of the 8th USENIX Security Symposium, 2012
 G. E. Blonder, "Graphical passwords," in Lucent Technologies, Inc., Murray Hill, NJ, U. S. Patent, Ed. United States, 2009
Graphical password Authentication, Knowledge-Based Authentication Security, CAPTCHA, Persuasive Cued Click-Points