Graphical passwords: A survey

X Suo, Y Zhu, GS Owen - 21st Annual Computer Security …, 2005 - ieeexplore.ieee.org
X Suo, Y Zhu, GS Owen
21st Annual Computer Security Applications Conference (ACSAC'05), 2005ieeexplore.ieee.org
The most common computer authentication method is to use alphanumerical usernames
and passwords. This method has been shown to have significant drawbacks. For example,
users tend to pick passwords that can be easily guessed. On the other hand, if a password is
hard to guess, then it is often hard to remember. To address this problem, some researchers
have developed authentication methods that use pictures as passwords. In this paper, we
conduct a comprehensive survey of the existing graphical password techniques. We classify …
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend to pick passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to remember. To address this problem, some researchers have developed authentication methods that use pictures as passwords. In this paper, we conduct a comprehensive survey of the existing graphical password techniques. We classify these techniques into two categories: recognition-based and recall-based approaches. We discuss the strengths and limitations of each method and point out the future research directions in this area. We also try to answer two important questions: "Are graphical passwords as secure as text-based passwords?"; "What are the major design and implementation issues for graphical passwords?" This survey will be useful for information security researchers and practitioners who are interested in finding an alternative to text-based authentication methods
ieeexplore.ieee.org