Abstract
In recent years, graphical passwords have become a viable alternative to the traditional text-based passwords due to their superior ease of recall and potential large password space. However, there is very limited research in classifying and mathematically analyzing the graphical password techniques. In this paper, we conduct a comprehensive study of the existing graphical password techniques. We propose the first taxonomy for graphical passwords methods and discuss the important elements in designing them. We present a mathematical analysis of the graphical password space. Finally we present a new graphical password scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Adams, A., Sasse, M.A.: Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures. Communications of the ACM 42, 41–46 (1999)
Shepard, R.N.: Recognition memory for words, sentences, and pictures. Journal of Verbal Learning and Verbal Behavior 6, 156–163 (1967)
Suo, X., Zhu, Y., Owen, G.S.: Graphical password: a survey. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC). IEEE, Los Alamitos (2005)
Dhamija, R.: Hash visualization in user authentication. In: Proceedings of the ACM Conference On Human Factors In Computer Systems (2000)
RealUser (last retrieved in August 2006), http://www.realuser.com
Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The design and analysis of graphical passwords. In: Proceedings of the 8th USENIX Security Symposium (1999)
Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: PassPoints: design and longitudinal evaluation of a graphical password system. International Journal of Human Computer Studies 63, 102–127 (2005)
Wayne, J.: Authenticating mobile device users through image selection. In: Morgan, K., Spector, M.J. (eds.) Advances in Learning, Commerce and Security. WIT Press, Southampton (2004)
Davis, D., Monrose, F., Reiter, M.K.: On user choice in graphical password schemes. In: Proceedings of the 13th USENIX Security Symposium (2004)
Wiedenbeck, S., Waters, J., Sobrado, L., Birget, J.C.: Design and evaluation of a shoulder-surfing resistant graphical password scheme. In: Proceedings of Advanced Visual Interfaces (AVI) (2006)
Syukri, A.F., Okamoto, E., Mambo, M.: A user identification system using signature written with mouse. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol. 1438, p. 403. Springer, Heidelberg (1998)
Dourish, P., Redmiles, D.: An approach to usable security based on event monitoring and visualization. In: Proceedings of New Security Paradigms Workshop (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Suo, X., Zhu, Y., Owen, G.S. (2006). Analysis and Design of Graphical Password Techniques. In: Bebis, G., et al. Advances in Visual Computing. ISVC 2006. Lecture Notes in Computer Science, vol 4292. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11919629_74
Download citation
DOI: https://doi.org/10.1007/11919629_74
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-48626-8
Online ISBN: 978-3-540-48627-5
eBook Packages: Computer ScienceComputer Science (R0)