Secure User Authentication & Graphical Password using Cued Click-Points
Miss.Saraswati B.Sahu, Associate Prof. Angad Singh "Secure User Authentication & Graphical Password using Cued Click-Points". International Journal of Computer Trends and Technology (IJCTT) V18(4):156-160, Dec 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
The major problem of user registration, mostly text base password, is well known. In the login user be inclined to select simple passwords which is frequently in mind that are straightforward for attackers to guess, difficult machine created password mostly complicated to user take in mind. User authenticate password using cued click points and Persuasive Cued Click Points graphical password scheme which includes usability and security evaluations. This paper includes the persuasion to secure user authentication & graphical password using cued click-points so that users select more random or more difficult to guess the passwords. In click-based graphical passwords, image or video frame that provide database to load the image, and then store all information into database. Mainly passwords are composed of strings which have letters as well as digits. Example is alpha-numeric type letters and digits.
References
[1] S. Chiasson, R. Biddle, and P. van Oorschot, “A Second Look at the Usability of Click-Based Graphical Passwords,” Proc. ACM Symp. Usable Privacy and Security (SOUPS), July 2007.
[2] S. Chiasson, A. Forget, R. Biddle, and P. van Oorschot, “Influencing Users towards Better Passwords: Persuasive Cued Click- Points,” British HCI Group Ann. Conf. People and Computers: Culture, Creativity, Interaction, Sept. 2008.
[3] S. Chiasson, A. Forget, E. Stobert, P. van Oorschot, and R. Bddle, “Multiple Password Interference in Text and Click-Based Graphical Passwords,” Proc. ACM Conf. Computer and Comm. Security CCS), Nov. 2009.
[4] E. Stobert, A. Forget, S. Chiasson, P. van Oorschot, and R.Biddle, “Exploring Usability Effects of Increasing Security in Click-Based Graphical Passwords,” Proc. Ann. Computer Security Applications Conf. (ACSAC), 2010.
[5] S. Chiasson, A. Forget, R. Biddle, and P.C. van Oorschot, “User Interface Design Affects Security: Patterns in Click-Based Graphical Passwords,” Intl J. Information Security, vol. 8, no. 6, pp. 387- 398, 2009.
[6] J. Yan, A. Blackwell, R. Anderson, and A. Grant, “The Memorability and Security of Passwords,” Security and Usability: Designing Secure Systems That People Can Use, L. Cranor and S. Garfinkel, eds., ch. 7, pp. 129-142, O?Reilly Media, 2005.
[7] L. Jones, A. Anton, and J. Earp, “Towards Understanding User Perceptions of Authentication Technologies,” Proc. ACM Workshop Privacy in Electronic Soc., 2007.
[8] L. O’Gorman, “Comparing Passwords, Tokens, and Biometrics for User Authentication,” Proc. IEEE, vol. 91, no. 12, pp. 2019-2020, Dec. 2003.
[9] A. Jain, A. Ross, and S. Pankanti, “Biometrics: A Tool for Information Security,” IEEE Trans. Information Forensics and Security (TIFS), vol. 1, no. 2, pp. 125-143, June 2006.
[10] S. Chiasson, P. van Oorschot, and R. Biddle, “Graphical Password Authentication Using Cued Click Points,” Proc. European Symp. Research in Computer Security (ESORICS), pp. 359-374, Sept. 2007.
[11] Sonia Chiasson, Elizabeth Stobert, Alain Forget, Robert Biddle , and Paul C. van Oorschot “Persuasive Cued Click-Points: Design, Implementation, and Evaluation of aKnowledge-Based Authentication Mechanism”, IEEE Transactions On Dependable And Secure Computing, Vol. 9, No. 2, March/April 2012
[12] R. Biddle, S. Chiasson, and P. van Oorschot, “Graphical Passwords: Learning from the First Twelve Years,” to be published in ACM Computing Surveys, vol. 44, no. 4, 2012.
[13] A. De Angeli, L. Coventry, G. Johnson, and K. Renaud, “Is a Picture Really Worth a Thousand Words? Exploring the Feasibility of Graphical Authentication Systems,” Int’l J. Human-Computer Studies, vol. 63, nos. 1/2, pp. 128-152, 2005.
[14] P.C. van Oorschot and J. Thorpe, “Exploiting Predictability in Click-Based Graphical Passwords,” J. Computer Security, vol. 19, no. 4, pp. 669-702, 2011.
[15] S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, “PassPoints: Design and Longitudinal Evaluation of a Graphical Password System,” Int’l J. Human-Computer Studies, vol. 63,nos. 1/2, pp. 102-127, 2005.
[16] A. De Angeli, L. Coventry, G. Johnson, and K. Renaud, “Is a Picture Really Worth a Thousand Words? Exploring the Feasibilityof Graphical Authentication Systems,” Int’l J. Human-Computer Studies, vol. 63, nos.128-152, 2005.
[17] S. Chiasson, P. van Oorschot, and R. Biddle, “Graphical Password Authentication Using Cued Click Points,” Proc. European Symp.Research in Computer Security (ESORICS), pp. 359-374, Sept. 2007.
[18] Dimitri Van De Ville, W.P., Rik Van de Walle, Ignace Lemahieu, Image Scrambling Without Bandwidth Expansion. IEEE Transactions on Cirsuits and Systems for Video Technology, 2004. 14
[19] R. Biddle, S. Chiasson, P. van Oorschot, “Graphical passwords: Learning from the first twelve years,” vol. 44, no. 4, 2012.
Keywords
User Authentication, Graphical Password, Persuasive Cued Click-Points, Cued Click Point.