Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/CSAC.2005.27guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Graphical Passwords: A Survey

Published: 05 December 2005 Publication History

Abstract

The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend to pick passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to remember. To address this problem, some researchers have developed authentication methods that use pictures as passwords. In this paper, we conduct a comprehensive survey of the existing graphical password techniques. We classify these techniques into two categories: recognition-based and recall-based approaches. We discuss the strengths and limitations of each method and point out the future research directions in this area. We also try to answer two important questions: "Are graphical passwords as secure as text-based passwords?"; "What are the major design and implementation issues for graphical passwords?" This survey will be useful for information security researchers and practitioners who are interested in finding an alternative to text-based authentication methods.

Cited By

View all
  • (2024)A3C: An Image-Association-Based Computing Device Authentication Framework for People with Upper Extremity ImpairmentsACM Transactions on Accessible Computing10.1145/365252217:2(1-37)Online publication date: 19-Mar-2024
  • (2023)A Survey of Behavioral Biometric Authentication on SmartphonesProceedings of the 2023 4th International Conference on Machine Learning and Computer Application10.1145/3650215.3650342(722-729)Online publication date: 27-Oct-2023
  • (2023)BioCase: Privacy Protection via Acoustic Sensing of Finger Touches on Smartphone Case Mini-StructuresProceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services10.1145/3581791.3596841(397-409)Online publication date: 18-Jun-2023
  • Show More Cited By

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference
December 2005
544 pages
ISBN:0769524613

Publisher

IEEE Computer Society

United States

Publication History

Published: 05 December 2005

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A3C: An Image-Association-Based Computing Device Authentication Framework for People with Upper Extremity ImpairmentsACM Transactions on Accessible Computing10.1145/365252217:2(1-37)Online publication date: 19-Mar-2024
  • (2023)A Survey of Behavioral Biometric Authentication on SmartphonesProceedings of the 2023 4th International Conference on Machine Learning and Computer Application10.1145/3650215.3650342(722-729)Online publication date: 27-Oct-2023
  • (2023)BioCase: Privacy Protection via Acoustic Sensing of Finger Touches on Smartphone Case Mini-StructuresProceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services10.1145/3581791.3596841(397-409)Online publication date: 18-Jun-2023
  • (2021)Global Feature Analysis and Comparative Evaluation of Freestyle In-Air-Handwriting Passcode for User AuthenticationProceedings of the 37th Annual Computer Security Applications Conference10.1145/3485832.3485906(468-481)Online publication date: 6-Dec-2021
  • (2021)Pict-Place Authentication: Recognition-based Graphical Password using Image Layout for Better Balance of Security and Operation TimeProceedings of the 14th Biannual Conference of the Italian SIGCHI Chapter10.1145/3464385.3464709(1-7)Online publication date: 11-Jul-2021
  • (2021)Pure Recall-Based Graphical User Authentication Schemes: Perspectives from a Closer Look3rd African Human-Computer Interaction Conference: Inclusiveness and Empowerment10.1145/3448696.3448721(141-145)Online publication date: 8-Mar-2021
  • (2021)A Taxonomy of Multimedia-based Graphical User Authentication for Green Internet of ThingsACM Transactions on Internet Technology10.1145/343354422:2(1-28)Online publication date: 22-Oct-2021
  • (2020)EchoLock: Towards Low-effort Mobile User Identification Leveraging Structure-borne EchosProceedings of the 15th ACM Asia Conference on Computer and Communications Security10.1145/3320269.3384741(772-783)Online publication date: 5-Oct-2020
  • (2019)Challenge-response behavioral mobile authenticationProceedings of the 35th Annual Computer Security Applications Conference10.1145/3359789.3359838(355-365)Online publication date: 9-Dec-2019
  • (2019)Authentication using alignment of the graphical passwordProceedings of the Third International Conference on Advanced Informatics for Computing Research10.1145/3339311.3339332(1-5)Online publication date: 15-Jun-2019
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media