Skip to main content

Object-Based Graphical User Authentication Scheme

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 438))

Abstract

The technique of user authentication remains a key issue over the decades. The main motive behind proposal of graphical password is the human inclination to remember images better than text. In this paper, we have proposed a graphical user authentication scheme that is a hybrid technique, combination of recognition-based scheme and dynamic graphics consisting of objects. The objectives of the proposed technique are to resist shoulder surfing attacks, guessing attacks, etc., without compromising the usability. User study shows that the proposed technique is robust, secure, also offers high usability, and memorability. The results demonstrated that the scheme do not require any additional hardware and can be easily implemented in existing set-up, hence suited for authentication in public places such as ATMs, cyber cafes, mobile phones, etc.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Wiedenbeck, S., Waters, J., Sobrado, L., Birget, J.C.: Design and evaluation of a shoulder-surfing resistant graphical password scheme. In: Proc. of the Working Conference on Advanced Visual Interfaces, pp. 177–184 (2006).

    Google Scholar 

  2. Chiasson, S., Forget, A., Biddle, R.: Accessibility and graphical passwords. In: Symposium on Accessible Privacy and Security, Pittsburgh, USA (2008).

    Google Scholar 

  3. Wu, T.S., Lee M.L., Lin, H.Y., Wang, C.Y.: Shoulder-surfing-proof graphical password authentication scheme. In: International Journal of Information Security, vol. 13, issue 3, pp. 245–254. Springer Berlin, Heidelberg (2014).

    Google Scholar 

  4. Alsaleh, M., Mannan, M., Oorschot, P.C.V.: Revisiting defenses against large-scale online password guessing attacks. In: IEEE Transaction on Dependable and Secure Computing, vol. 9, no. 1, pp. 128–141 (2012).

    Google Scholar 

  5. Oorschot, P.C.V., Salehi-Abari, A., Thorpe, J.: Purely Automated Attacks on PassPoints-Style Graphical Passwords. In: IEEE Transaction on Information Forensics and Security, vol. 5, no. 3, pp. 303–404 (2010).

    Google Scholar 

  6. Umar, M.S., Rafiq, M.Q.: A Graphical Interface for User Authentication on Mobile Phones. In: ACHI 2011: The Fourth International Conference on Advances in Computer-Human Interactions, pp. 69–74, Guadeloupe, France (2011).

    Google Scholar 

  7. Eluard, M., Maetz, Y., Alessio, S.: Action-based graphical password: Click-a-Secret. In: 2011 IEEE International Conference on Consumer Electronics, pp. 265–266 (2011).

    Google Scholar 

  8. Sabzevar and Stavrou: Universal multi-factor authentication using graphical passwords. In: Proc. of the 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems, pp. 625–632 (2008).

    Google Scholar 

  9. Umar, M.S., Saeed, S.: Graphical User Authentication Based on Image Transformation. In: Proc. of 3rd International Conference of Engineering and Applied Sciences, pp. 7–14 Alberta, Canada (2014).

    Google Scholar 

  10. Lin, R., Huang, S.Y., Bell, G.B., Lee, Y.K.: A new CAPTCHA interface design for mobile devices. In: Proc. 12th Austral. User Inter. Conf, pp. 3–8 (2011).

    Google Scholar 

  11. Syed, Z., Banerjee, S., Cheng, Q., Cukic B.: Effects of user habituation in keystroke dynamics on password security policy. In: Proc. IEEE 13th Int. Symp. High-Assur. Syst. Eng., pp. 352–359 (2011).

    Google Scholar 

  12. Bonneau, J.: The science of guessing: Analyzing an anonymized corpus of 70 million passwords. In: Proc. IEEE Symp. Security Privacy, pp. 20–25 (2012).

    Google Scholar 

  13. Trewin, S., Swart, C., Koved, L., Martino, J., Singh, K., Ben-David, S.: Biometric authentication on a mobile device: A study of user effort, error and task disruption. In: Proc. 28th Annu. Comput. Security Appl. Conf., pp. 159–168 (2012).

    Google Scholar 

  14. Alsulaiman, F.A., Saddik, A.E.: Three-Dimensional Password for More Secure Authentication. In: IEEE Transaction on Instrumentation and Measurement, vol. 57, no. 9, pp. 1929–1938 (2008).

    Google Scholar 

  15. Shi, Zhu, Youssef: A PIN entry scheme resistant to recording-based shoulder-surfing. In: Proc. of the 2009 Third International Conference on Emerging Security Information, Systems and Technologies, pp. 237–241 (2009).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Swaleha Saeed .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Swaleha Saeed, Sarosh Umar, M. (2016). Object-Based Graphical User Authentication Scheme. In: Satapathy, S., Bhatt, Y., Joshi, A., Mishra, D. (eds) Proceedings of the International Congress on Information and Communication Technology. Advances in Intelligent Systems and Computing, vol 438. Springer, Singapore. https://doi.org/10.1007/978-981-10-0767-5_45

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0767-5_45

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0766-8

  • Online ISBN: 978-981-10-0767-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics