A Novel user Authentication Method Based on Freehand Sketches
||International Journal of Computer Trends and Technology (IJCTT)||
|© 2018 by IJCTT Journal|
|Year of Publication : 2018|
|Authors : P.Sukin, Dr. A.Anitha, J.P.Jayan|
|DOI : 10.14445/22312803/IJCTT-V59P116|
P.Sukin, Dr. A.Anitha, J.P.Jayan "A Novel user Authentication Method Based on Freehand Sketches". International Journal of Computer Trends and Technology (IJCTT) V59(2):94-98, May 2018. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
More recent methodologies for graphical password authentication in the group of sketch metric system constitute draw-a-secret (DAS) is to abridge the trouble of compare sketches by training the free rein figure into a separate symbols of code. The main drawback of DAS be to the consumer have near guarantee to the drawing be reproducing into the correct location since into the new sketch and hence it is hard to authenticate. To beat this problem this paper, intend an verification structure to be base lying on free rein sketch. The necessary plan of the verification structure projected during this project be near record with verify user in resources of free rein sketch. The main challenge of such a method is twofold. First, formally characterize the primary sketch in funds of string plus near a common verification algorithm to be base lying on structural model gratitude. Next, to compute the distinction between sketches, considerably expand the idea of twine change reserve during this project near resources of a novel cost form. Experimental results show that proposed algorithms are efficient for both random and skilled forgeries, and outperform state-of-the-art methods on real-world datasets.
 S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, “PassPoints: Design and longitudinal evaluation of a graphical password system,” Int. J. Human Comput. Stud., vol. 63, nos. 1–2, pp. 102–127, 2005.
 S. Chiasson, E. Stobert, A. Forget, R. Biddle, and P. C. van Oorschot, “Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism,” IEEE Trans. Depend. Secure Comput., vol. 9, no. 2, pp. 222–235, Mar./Apr. 2012.
 R. Dhamija and A. Perrig, “Déjà Vu: A user study using images for authentication,” in Proc. 9th USENIX Security Symp., 2000, p. 4.
 A. De Angeli, L. Coventry, G. Johnson, and K. Renaud, “Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems,” Int. J. Human Comput., vol. 63, nos. 1–2, pp. 128–152, 2005.
 E. Hayashi, R. Dhamija, N. Christin, and A. Perrig, “Use your illusion: Secure authentication usable anywhere,” in Proc. 4th ACM Symp. Usable Privacy Security, Pittsburgh, PA, USA, 2008, pp. 35–45.
 D. Impedovo and G. Pirlo, “Automatic signature verification: The state of the art,” IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 38, no. 5, pp. 609–635, Sep. 2008.
 E. Griechisch, M. I. Malik, and M. Liwicki, “Online signature verification based on Kolmogorov–Smirnov distribution distance,” in Proc. 14th Int. Conf. Front.  Handwriting Recognit., Heraklion, Greece, 2014, pp. 738–742.
 M. Yadav, A. Kumar, T. Patnaik, and B. Kumar, “A survey on offline signature verification,” Int. J. Eng. Innov. Technol., vol. 2, no. 7, pp. 337–340, 2013.
 I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, “The design and analysis of graphical passwords,” in Proc. 8th Conf. USENIX Security Symp., Berkeley, CA, USA, 1999, p. 1.
 J. Fierrez and J. Ortega-Garcia, “On-line signature verification,” in Handbook of Biometrics. A. K. Jain and A. Ross, and P. Flynn, Eds. New York, NY, USA: Springer, 2008, pp. 189–209.
 I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, “The design and analysis of graphical passwords,” in Proc. 8th USENIX Security Symp., 1999, p. 1.
 C. Varenhorst, “Passdoodles; a lightweight authentication method,” Res. Sci. Inst., Massachusetts Inst. Technol., Cambridge, MA, USA, Tech. Rep., 2004.
 P. Dunphy and J. Yan, “Do background images improve “draw a secret” graphical passwords?” in Proc. 14th ACM Conf. Comput. Commun. Security, 2007, pp. 36–47.
 H. Tao and C. Adams, “Pass-go: A proposal to improve the usability of graphical passwords.” Int. J. Netw. Security, vol. 7, no. 2, pp. 273–292, 2008
 H. Gao, X. Guo, X. Chen, L. Wang, and X. Liu, “YAGP: Yet another graphical password strategy,” in Proc. Ann. Comput. Security Appl. Conf., 2008, pp. 121–129.
 M. Oka, K. Kato, X. Yingqing, L. Liang, and F. Wen, “Scribble-a-secret: Similarity-based password authentication using sketches,” in Proc. Int. Conf. Pattern Recog., 2008, pp. 1–4.
 J. Chen, D. Lopresti, and F. Monrose, “Toward resisting forgery attacks via pseudo-signatures,” in Proc. 10th Int. Conf. Document Anal. Recog., 2009, pp. 51–55.
 W. Zada Khan, M. Y. Aalsalem, and Y. Xiang, “A graphical password based system for small mobile devices,” Int. J. Comput. Sci. Issues, vol. 8, no. 5, pp. 145–154, 2011.
graphical passwords, sketch recognition, string edit distance, user authentication.