Abstract
Password remains one of the main authentication methods in today’s time. The challenge with password as authentication system is due to its dependency on humans. Its strength and weakness is decided by the alphanumeric string set by users. A number of the websites demand users to use strong passwords even though they do not safeguard any critical information assets. This results in an unnecessary cognitive burden on users. It can be reduced by minimizing the number of strong passwords that he/she has to remember. A password composition scheme that considers criticality of information asset is required for this purpose. This article presents one such scheme using inverse document frequency. Users are authenticated based on a valid English sentence. Sentences leave alphanumeric strings behind in recall due to their semantic nature. Users select their authentication sentence by using an image as context. Humans are good at recalling context based information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
The Man Who Invented The Computer Password Admits That It’s Become A Nightmare. http://www.businessinsider.in/The-Man-Who-Invented-The-Computer-Password-Admits-That-Its-Become-A-Nightmare/articleshow/35484027.cms
Bonneau, J., et al.: The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: 2012 IEEE Symposium on Security and Privacy (SP). IEEE (2012)
Paivio, A.: The empirical case for dual coding. In: Imagery, Memory and Cognition, pp. 307–332 (1983)
Florêncio, D., Herley, C., Coskun, B.: Do strong web passwords accomplish anything? HotSec 7(6) (2007)
Spector, Y., Ginzberg, J.: Pass-sentence—a new approach to computer code. Comput. Secur. 13(2), 145–160 (1994)
Robertson, S.: Understanding inverse document frequency: on theoretical arguments for IDF. J. Documentation 60(5), 503–520 (2004)
Weiss, R., De Luca, A.: PassShapes: utilizing stroke based authentication to increase password memorability. In: Proceedings of the 5th Nordic Conference on Human-Computer Interaction: Building Bridges. ACM (2008)
Shay, R., et al.: A spoonful of sugar? The impact of guidance and feedback on password-creation behavior. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM (2015)
Kuo, C., Romanosky, S., Cranor, L.F.: Human selection of mnemonic phrase-based passwords. In: Proceedings of the Second Symposium on Usable Privacy and Security. ACM (2006)
Smith, S.L.: Authenticating users by word association. Comput. Secur. 6(6), 464–470 (1987)
Komanduri, S., et al.: Telepathwords: Preventing Weak Passwords by Reading Users’ Minds. USENIX Security (2014)
Florêncio, D., Herley, C., Van Oorschot, P.C.: Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts. Usenix Security (2014)
Florêncio, D., Herley, C.: Where do security policies come from? In: Proceedings of the Sixth Symposium on Usable Privacy and Security. ACM (2010)
Yan, J., et al.: The memorability and security of passwords–some empirical results. No. UCAM-CL-TR-500. University of Cambridge, Computer Laboratory (2000)
Gaw, S., Felten, E.W.: Password management strategies for online accounts. In: Proceedings of the Second Symposium on Usable Privacy and Security. ACM (2006)
Chiasson, S., et al.: Multiple password interference in text passwords and click-based graphical passwords. In: Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM (2009)
Tulving, E., Pearlstone, Z.: Availability versus accessibility of information in memory for words. J. Verbal Learn. Verbal Behav. 5(4), 381–391 (1966)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Arun, K.P., Mishra, A. (2017). Image Based Password Composition Using Inverse Document Frequency. In: Kaushik, S., Gupta, D., Kharb, L., Chahal, D. (eds) Information, Communication and Computing Technology. ICICCT 2017. Communications in Computer and Information Science, vol 750. Springer, Singapore. https://doi.org/10.1007/978-981-10-6544-6_10
Download citation
DOI: https://doi.org/10.1007/978-981-10-6544-6_10
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6543-9
Online ISBN: 978-981-10-6544-6
eBook Packages: Computer ScienceComputer Science (R0)