Skip to main content

Image Based Password Composition Using Inverse Document Frequency

  • Conference paper
  • First Online:
Information, Communication and Computing Technology (ICICCT 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 750))

  • 1738 Accesses

Abstract

Password remains one of the main authentication methods in today’s time. The challenge with password as authentication system is due to its dependency on humans. Its strength and weakness is decided by the alphanumeric string set by users. A number of the websites demand users to use strong passwords even though they do not safeguard any critical information assets. This results in an unnecessary cognitive burden on users. It can be reduced by minimizing the number of strong passwords that he/she has to remember. A password composition scheme that considers criticality of information asset is required for this purpose. This article presents one such scheme using inverse document frequency. Users are authenticated based on a valid English sentence. Sentences leave alphanumeric strings behind in recall due to their semantic nature. Users select their authentication sentence by using an image as context. Humans are good at recalling context based information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. The Man Who Invented The Computer Password Admits That It’s Become A Nightmare. http://www.businessinsider.in/The-Man-Who-Invented-The-Computer-Password-Admits-That-Its-Become-A-Nightmare/articleshow/35484027.cms

  2. Bonneau, J., et al.: The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: 2012 IEEE Symposium on Security and Privacy (SP). IEEE (2012)

    Google Scholar 

  3. Paivio, A.: The empirical case for dual coding. In: Imagery, Memory and Cognition, pp. 307–332 (1983)

    Google Scholar 

  4. Florêncio, D., Herley, C., Coskun, B.: Do strong web passwords accomplish anything? HotSec 7(6) (2007)

    Google Scholar 

  5. Spector, Y., Ginzberg, J.: Pass-sentence—a new approach to computer code. Comput. Secur. 13(2), 145–160 (1994)

    Article  Google Scholar 

  6. Robertson, S.: Understanding inverse document frequency: on theoretical arguments for IDF. J. Documentation 60(5), 503–520 (2004)

    Article  Google Scholar 

  7. Weiss, R., De Luca, A.: PassShapes: utilizing stroke based authentication to increase password memorability. In: Proceedings of the 5th Nordic Conference on Human-Computer Interaction: Building Bridges. ACM (2008)

    Google Scholar 

  8. Shay, R., et al.: A spoonful of sugar? The impact of guidance and feedback on password-creation behavior. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM (2015)

    Google Scholar 

  9. Kuo, C., Romanosky, S., Cranor, L.F.: Human selection of mnemonic phrase-based passwords. In: Proceedings of the Second Symposium on Usable Privacy and Security. ACM (2006)

    Google Scholar 

  10. Smith, S.L.: Authenticating users by word association. Comput. Secur. 6(6), 464–470 (1987)

    Article  Google Scholar 

  11. Komanduri, S., et al.: Telepathwords: Preventing Weak Passwords by Reading Users’ Minds. USENIX Security (2014)

    Google Scholar 

  12. Florêncio, D., Herley, C., Van Oorschot, P.C.: Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts. Usenix Security (2014)

    Google Scholar 

  13. Florêncio, D., Herley, C.: Where do security policies come from? In: Proceedings of the Sixth Symposium on Usable Privacy and Security. ACM (2010)

    Google Scholar 

  14. Yan, J., et al.: The memorability and security of passwords–some empirical results. No. UCAM-CL-TR-500. University of Cambridge, Computer Laboratory (2000)

    Google Scholar 

  15. Gaw, S., Felten, E.W.: Password management strategies for online accounts. In: Proceedings of the Second Symposium on Usable Privacy and Security. ACM (2006)

    Google Scholar 

  16. Chiasson, S., et al.: Multiple password interference in text passwords and click-based graphical passwords. In: Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM (2009)

    Google Scholar 

  17. Tulving, E., Pearlstone, Z.: Availability versus accessibility of information in memory for words. J. Verbal Learn. Verbal Behav. 5(4), 381–391 (1966)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. P. Arun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Arun, K.P., Mishra, A. (2017). Image Based Password Composition Using Inverse Document Frequency. In: Kaushik, S., Gupta, D., Kharb, L., Chahal, D. (eds) Information, Communication and Computing Technology. ICICCT 2017. Communications in Computer and Information Science, vol 750. Springer, Singapore. https://doi.org/10.1007/978-981-10-6544-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6544-6_10

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6543-9

  • Online ISBN: 978-981-10-6544-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics