Open Access Open Access  Restricted Access Subscription or Fee Access

Feature Support Order Evaluation Technique on User Own Image in Multifactor Authentication

Ashwin Titus, P. Pandiyarajan

Abstract


User authentication is one of the most important procedures required to access secure and confidential data. Authentication of users is usually achieved through text-based passwords. Attackers through social engineering techniques easily obtain the text based password of a user. Apart from being vulnerable to social engineering attacks, text based passwords are either weakand- memorable or secure but of modern days have thus gone for alternative methods wherein graphical pictures are used as passwords. Image based authentication allows user to create graphical password which has advantages over text-based passwords. Graphical passwords have been designed to make passwords more.

Keywords


Graphical Password, Input, Live Video, Observation, User Study

Full Text:

PDF

References


. A. Adams and M. Sasse, “Users are not the enemy,” Commun.ACM, vol. 42, pp. 40–46, 1999.

. M. Adham, A. Azodi, Y. Desmedt, and I. Karaolis, “How to attack twofactor authentication internet banking,” in Proc. 17th Int. Conf. FinancialCryptography, 2013, pp. 322–328.

. ARTigo, http://www.artigo.org/.

. F. Aloul, S. Zahidi, and W. El-Hajj, “Two factor authentication using mobile phones,” Proc. Comput. Syst. Appl., 2009, pp. 641–644.

. R. Biddle, S. Chiasson, and P. van Oorschot, “Graphical passwords: Learning from the first twelve years,” ACM Comput. Surveys vol. 44, no. 4, p. 19, 2012.

. G. E. Blonder, “Graphical passwords,” U.S. Patent 5 559 961, 1996.

. J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano, “The quest to replace passwords: A framework for comparative evaluation of web authentication schemes,” in Proc. IEEE Symp. Security Privacy, 2012, pp. 553–567.

. S.Chiasson, R. Biddle, and P. van Oorschot, “Asecond look at the usability of click-based graphical passwords,” in Proc. 3rd Symp. Usable PrivacySecurity, 2007, pp. 1–12.

. S. Chiasson, P. C. van Oorschot, and R. Biddle, “Graphical password authentication using cued click points,” in Proc. 12th Eur. Symp. Res.Comput. Security, 2007, pp. 359–374.

. S. Chiasson, A. Forget, R. Biddle, and P. C. Oorschot, “User interface design affects security: Patterns in click-based graphical passwords, Int.J. Inf. Security, vol. 8, no. 6, pp. 387–398, 2009.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.