Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3464385.3464709acmotherconferencesArticle/Chapter ViewAbstractPublication PageschitalyConference Proceedingsconference-collections
research-article

Pict-Place Authentication: Recognition-based Graphical Password using Image Layout for Better Balance of Security and Operation Time

Published: 13 July 2021 Publication History

Abstract

In this paper, we propose a novel recognition-based graphical authentication (RbGA) scheme, named “Pict-Place authentication” (PPA). RbGA was expected to improve the credential memorability issue of knowledge-based user authentication. However, RbGA has not been widely used owing to its low security and longer operation time. We therefore propose a new RbGA scheme to modify the credential input method in order to improve these issues. In PPA, the credential is input as a layout of multiple images. Based on this idea, we implemented a web-based prototype system and conducted evaluation experiments. The results indicate that PPA has the potential to reduce the operation time and improve theoretical security.

References

[1]
Harada Atsushi, Isarida Takeo, Mizuno Tadanori, and Nishigaki Masakatsu. 2005. A User Authentication System Using Schema of Visual Memory. J. IPS Japan 46, 8 (aug 2005), 1997–2013.
[2]
Robert Biddle, Sonia Chiasson, and P.C. Van Oorschot. 2012. Graphical Passwords: Learning from the First Twelve Years. ACM Comput. Surv. 44, 4, Article 19 (Sept. 2012), 41 pages. https://doi.org/10.1145/2333112.2333114
[3]
John Brooke. 1996. Sus: a “quick and dirty’usability. Usability evaluation in industry 189 (1996).
[4]
Sasse M.A. Brostoff S.2000. Are Passfaces More Usable Than Passwords? A Field Trial Investigation. In People and Computers XIV — Usability or Else!https://doi.org/10.1007/978-1-4471-0515-2_27
[5]
Darren Davis, Fabian Monrose, and Michael K Reiter. 2004. On user choice in graphical password schemes. In USENIX Security Symposium, Vol. 13. 11–11.
[6]
Antonella De Angeli, Lynne Coventry, Graham Johnson, and Karen Renaud. 2005. Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. International Journal of Human-Computer Studies 63, 1 (2005), 128 – 152. https://doi.org/10.1016/j.ijhcs.2005.04.020 HCI research in privacy and security.
[7]
Rachna Dhamija and Adrian Perrig. 2000. Deja Vu-A User Study: Using Images for Authentication. In USENIX Security Symposium, Vol. 9. 4–4.
[8]
Eiji Hayashi, Rachna Dhamija, Nicolas Christin, and Adrian Perrig. 2008. Use Your Illusion: Secure Authentication Usable Anywhere. In Proceedings of the 4th Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, USA) (SOUPS ’08). Association for Computing Machinery, New York, NY, USA, 35–45. https://doi.org/10.1145/1408664.1408670
[9]
Allan Paivio. 1969. Mental imagery in associative learning and memory. Psychological Review 76, 3 (1969), 241–263. https://doi.org/10.1037/h0027272
[10]
Trevor Pering, Murali Sundar, John Light, and Roy Want. 2003. Photographic authentication through untrusted terminals. IEEE Pervasive Computing 2, 1 (2003), 30–36. https://doi.org/10.1109/MPRV.2003.1186723
[11]
Tetsuji Takada and Hideki Koike. 2003. Awase-E: Image-Based Authentication for Mobile Phones Using User’s Favorite Images. In Human-Computer Interaction with Mobile Devices and Services. Mobile HCI 2003, Vol. 2795. https://doi.org/10.1007/978-3-540-45233-1_26
[12]
Tetsuji Takada, Takehito Onuki, and Hideki Koike. 2006. Awase-E: Recognition-based Image Authentication Scheme Using Users’ Personal Photographs. In 2006 Innovations in Information Technology. 1–5. https://doi.org/10.1109/INNOVATIONS.2006.301970
[13]
Xiaoyuan Suo, Ying Zhu, and G. S. Owen. 2005. Graphical passwords: a survey. In 21st Annual Computer Security Applications Conference (ACSAC’05). 10 pages. https://doi.org/10.1109/CSAC.2005.27

Cited By

View all
  • (2024)Reimagining Authentication: A User-Centric Two-Factor Authentication with Personalized Image Verification2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems (ICETSIS)10.1109/ICETSIS61505.2024.10459708(281-285)Online publication date: 28-Jan-2024
  • (2024)Password based authentication for web based graphics computing services retrieval in cloudMultimedia Tools and Applications10.1007/s11042-024-19044-883:36(84357-84379)Online publication date: 19-Apr-2024
  • (2023)An Efficient Multifactor Authentication SystemComputational Intelligence in Pattern Recognition10.1007/978-981-99-3734-9_10(109-122)Online publication date: 27-Aug-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
CHItaly '21: Proceedings of the 14th Biannual Conference of the Italian SIGCHI Chapter
July 2021
237 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 July 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. graphical authentication
  2. graphical password
  3. image layout
  4. mobile
  5. security
  6. usability
  7. user authentication

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

CHItaly '21

Acceptance Rates

Overall Acceptance Rate 109 of 242 submissions, 45%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)19
  • Downloads (Last 6 weeks)4
Reflects downloads up to 13 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Reimagining Authentication: A User-Centric Two-Factor Authentication with Personalized Image Verification2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems (ICETSIS)10.1109/ICETSIS61505.2024.10459708(281-285)Online publication date: 28-Jan-2024
  • (2024)Password based authentication for web based graphics computing services retrieval in cloudMultimedia Tools and Applications10.1007/s11042-024-19044-883:36(84357-84379)Online publication date: 19-Apr-2024
  • (2023)An Efficient Multifactor Authentication SystemComputational Intelligence in Pattern Recognition10.1007/978-981-99-3734-9_10(109-122)Online publication date: 27-Aug-2023
  • (2022)EYEDi: Graphical Authentication Scheme of Estimating Your Encodable Distorted Images to Prevent Screenshot AttacksIEEE Access10.1109/ACCESS.2021.313809310(2256-2268)Online publication date: 2022

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media