skip to main content
10.1145/2508859.2512503acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

POSTER: Graphical password using object-based image ranking

Published: 04 November 2013 Publication History

Abstract

In this paper, we propose a new graphical password using object-based image ranking, called OBIR, which enables appropriate images to be presented to users during authentication. Research on graphical password is being conducted and receiving more and more public attention due to its potential of being an alternative for textual password. However, the main problem of graphical password is its vulnerability to shoulder surfing attacks, especially on mobile devices where the login password is easily visible in public. In order to overcome this issue, we propose a novel graphical password using image ranking method based on the objects in the image itself. The higher the ranking of an image is, the more appropriate it is to be user's selection without exposing too much information of the password to the shoulder-surfer. Upon our experiments, it is obtained that our image ranking method is effective in filtering appropriate pass-image that even if it is selected in public, the password is safe and therefore resistant to shoulder surfing.

References

[1]
R. A. Khot, K. Srinathan, and P. Kumaraguru. Marasim: a novel jigsaw based authentication scheme using tagging. In CHI 2011, pages 2605--2614, 2011.
[2]
S. Sakaguchi, H.-H. Huang, and K. Kawagoe. Tag association based graphical password with image search web services. In EDB'11, pages 152--163, 2011.
[3]
K. Kawagoe, S. Sakaguchi, Y. Sakon, and H.-H. Huang. Tag association based graphical password using image feature matching. In DASFAA'12 - Part II, pages 282--286, 2012.
[4]
R. Biddle, S. Chiasson, and P. Van Oorschot. Graphical passwords: Learning from the first twelve years. ACM Comput. Surv., 44(4):19:1--19:41, 2012.
[5]
S. Chiasson, A. Forget, E. Stobert, P. C. van Oorschot, and R. Biddle. Multiple password interference in text passwords and click-based graphical passwords. In ACM, CCS'09, pages 500--511, 2009.
[6]
P. Dunphy and P. Olivier. On automated image choice for secure and usable graphical passwords. In ACSAC 2012, pages 99--108. ACM, 2012.
[7]
S. Wiedenbeck, J. Waters, L. Sobrado, and J.-C. Birget. Design and evaluation of a shoulder-surfing resistant graphical password scheme. In AVI'06, pages 177--184, 2006.
[8]
H. Mohammad, I. Norafida, and P. Rezvan. Multi touch graphical password: Usability features. Asian Journal of Applied Sciences, 5: 20--32., 2012.
[9]
X. Suo, Y. Zhu, and G. S. Owen. Graphical passwords: A survey. In ACSAC 2005, pages 463--472, 2005.
[10]
M. Everingham, L. Van Gool, C. K. I. Williams, J. Winn, and A. Zisserman. The PASCAL Visual Object Classes Challenge 2012 Results. http://www.pascal-network.org/challenges/VOC/voc2012/workshop/index.html, 2012.

Cited By

View all
  • (2024)A systematic review of graphical password methods resistant to shoulder-surfing attacksInternational Journal of Information Security10.1007/s10207-024-00956-324:1Online publication date: 18-Dec-2024
  • (2014)POSTERProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security10.1145/2660267.2662379(1460-1462)Online publication date: 3-Nov-2014

Index Terms

  1. POSTER: Graphical password using object-based image ranking

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
    November 2013
    1530 pages
    ISBN:9781450324779
    DOI:10.1145/2508859
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 November 2013

    Check for updates

    Author Tags

    1. graphics
    2. images
    3. password
    4. scoring

    Qualifiers

    • Poster

    Conference

    CCS'13
    Sponsor:

    Acceptance Rates

    CCS '13 Paper Acceptance Rate 105 of 530 submissions, 20%;
    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 14 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A systematic review of graphical password methods resistant to shoulder-surfing attacksInternational Journal of Information Security10.1007/s10207-024-00956-324:1Online publication date: 18-Dec-2024
    • (2014)POSTERProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security10.1145/2660267.2662379(1460-1462)Online publication date: 3-Nov-2014

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media