Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Utkarsh Bhardwaj, Vishal Krishna, Tanya , Sudhanshu Verma, Dr. (Prof.) Ragini Karwayun
DOI Link: https://doi.org/10.22214/ijraset.2023.51883
Certificate: View Certificate
A graphical password authentication is a form of authentication where users select a picture, image, or sequence as their password. Graphical passwords are an alternative to alphanumeric passwords in which users click on graphical images rather than typing alphanumeric characters to authenticate their identity. This method has gained popularity due to its ease of use and ability to provide better security than traditional alphanumeric passwords. This research paper provides a comprehensive study of graphical password authentication, including its history, types, advantages and disadvantages, security concerns, and future developments. The paper also includes a review of related research on graphical password authentication and its effectiveness in different settings.
I. INTRODUCTION
Authentication is a crucial part of the security system, as it provides access control to the users. The traditional authentication method involves the use of alphanumeric passwords, but this method has several limitations, such as the difficulty of remembering complex passwords and the potential for password cracking. Graphical password authentication is an alternative method that has emerged in recent years as a more user-friendly and secure approach. This method allows users to select a picture, image, or sequence of pictures as their password. Graphical password authentication has gained significant attention in recent years, and several research works have been conducted to evaluate its effectiveness and security. This research paper aims to provide a comprehensive study of graphical password authentication. Verification is the process of determining if a client should be granted access to a given framework or item. It is a fundamental area of safety investigation and practice. Alphanumeric passwords are widely used for authentication, however other methods, such as biometrics, are also available today. In any event, there are problems with these optional developments. As a result, passwords remain prevalent and are expected to remain so for some time.
II. MOTIVATION
The primary motivation for graphical passwords is to make it easier for people to read or understand graphical content. It has been observed that cracking the graphical security mechanisms is difficult with conventional assaults. Graphical secret phrase plans have been presented as a potential alternative to conventional validation methods, owing to the fact that people can successfully recall images. Pictures, overall, are easier to remember or perceive. This research paper aims to provide a comprehensive study of graphical password authentication. Graphical password authentication is not a new concept, and it has been in use since the 1970s. The first graphical password system was introduced by Blonder in 1970, which used a touch screen to draw a signature for authentication. However, the technology was not advanced enough at that time, and the system was not implemented. In the 1990s, several researchers proposed graphical password authentication methods, including PassPoints, which used a grid of images, and Graphical Passwords, which used a combination of colors, shapes, and images. These systems provided better usability and security than traditional alphanumeric passwords. GPA has several advantages over traditional alphanumeric passwords. It is easier to remember than alphanumeric passwords, as users can select graphical elements based on their memory or personal preferences. Furthermore, GPA is more resistant to dictionary attacks than alphanumeric passwords, as the number of possible graphical combinations is significantly higher than the number of possible alphanumeric combinations.
III. LITERATURE REVIEW
IV. PROBLEM STATEMENT
An alphanumeric password is an old and widely used authentication technique. In practice, this old method is an insecure system. For example, if the user does not choose a strong password, the attacker may use an easily guessed password. The user may use the same password for multiple devices or websites. All of these are unsafe characteristics for normal users. And authentication is one of the critical security points where the user bears active responsibility for the security of their personal information. If we employ an old traditional password system, we may be vulnerable to dictionary attacks and brute force attacks.
V. COMPUTER AUTHENTICATION
Authentication [1] is the procedure by which a user proves their identity to a system or server. Entering a username and password when logging into a website is a common example. There are numerous forms of authentication.
Authentication permits legitimate users to gain access to the computer. If the authentication does not match, the unauthorized user will be refused access. Any digital system or site that needs to know who the actual authorized user is will employ this authentication mechanism. Even authentication is used to determine which resources the user has access to and which are denied access to, when the user has access to the resource, and how much of the source the user can consume.
Typically, server authentication requires the usage of a login and password. Other methods of authentication include cards, retina scans, voice recognition, and fingerprints, for instance. Client authentication often entails the server supplying the client with a certificate that a trusted third party, such as a bank, expects from the client. Authentication does not define which activities or files a user may conduct or view. Authentication merely identifies and verifies the identity of the user or system.
The primary goal of authentication is to grant authorized users access to the computer while denying unauthorized user access. Passwords, physical identification, and biometrics are three methods used by operating systems to identify and authenticate users.
C. Modules
The major modules and their respective functionalities are as follows:
VII. RESULTS
Techniques |
Text Based |
Color Based |
Image Based |
Security |
Less |
Highest |
Highest |
Usability |
Easy |
Easy |
Easiest |
Recollection Factor |
Decline with time |
Moderate |
High |
User Interface |
GUI Based / Less interactive |
GUI Based / More interactive |
GUI Based / Most interactive |
Prone to Shoulder Surf |
High |
Low |
Low |
Figure 3 Comparison of existing authentication techniques
VIII. IMPACT ON SOCIETY
Graphical password authentication has a significant impact on society, as it provides a more user-friendly and secure method of authentication compared to traditional alphanumeric passwords. Some of the impacts of graphical password authentication on society are as follows:
A. Improved Security
Graphical password authentication provides a higher level of security than traditional alphanumeric passwords. It is difficult for attackers to guess or crack graphical passwords, as the combination of images and sequence is unique to each user.
B. Ease of Use:
Graphical password authentication is more user-friendly than traditional alphanumeric passwords. Users can easily remember their selected images and sequence of images, and the authentication process is less cumbersome.
C. Accessibility
Graphical password authentication is accessible to a wide range of users, including those with disabilities such as dyslexia, as it does not rely on text-based input.
D. Reduced Risk of Identity Theft
Graphical password authentication reduces the risk of identity theft, as it is more challenging for attackers to gain unauthorized access to a user's account.
E. Improved User Experience
Graphical password authentication provides an improved user experience, as it offers a more engaging and interactive way of authenticating. Users can select images that are meaningful to them, making the authentication process more enjoyable.
F. Potential for Innovation
Graphical password authentication has the potential for innovation, as researchers and developers can continue to explore new ways to enhance its security and usability. This could lead to the development of new authentication methods that are even more secure and user-friendly.
IX. ACKNOWLEDGEMENT
We take this opportunity to express our profound gratitude and deep regards to Dr. (Prof.) Ragini Karwayun for her exemplary guidance, monitoring and constant encouragement throughout the course of this project. The help and guidance given by her from time to time shall carry us a long way in the journey of life on which we are about to embark.
In conclusion, graphical password authentication is an alternative method that has gained popularity due to its ease of use and ability to provide better security than traditional alphanumeric passwords. Future developments in graphical password authentication should focus on enhancing its security and usability. The development of biometric graphical password authentication, contextual graphical password authentication, multi-factor graphical password authentication, machine learning-based graphical password authentication, and usability improvements are some of the potential future developments in graphical password authentication. These developments can address the security concerns of graphical password authentication and provide a more secure and user-friendly authentication method.
[1] Graphical Password Authentication. Shraddha M. Gurav Computer Department Mumbai University RMCET Ratnagiri, India. Leena S. Gawade Computer Department Mumbai University RMCET Ratnagiri, India, 2014 IEEE. [2] A. S. Patrick, A. C. Long, and S. Flinn, “Hci and security systems,” in CHI’03 Extended Abstracts on Human Factors in Computing Systems, pp 1056-1057,ACM 2003. [3] A New Graphical Password Scheme Resistant to Shoulder-Surfing. Uwe Aickelin School of Computer Science the University of Nottingham Nottingham, NG8 1BB, U.K. [4] I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, “The design and analysis of graphical passwords.,” USENIX Association, 1999. [5] W. Jansen, S. Gavrila, V. Korolev, R. Ayers, and R. Swanstrom, \"Picture Password: A Visual Login Technique for Mobile Devices,\" National Institute of Standards and Technology Interagency Report NISTIR 7030, 2003. [6] A. Jain, L. Hong, and S. Pankanti, \"Biometric identification,\" Communications of the ACM, vol. 33,pp. 168-176, 2000. [7] D. Weinshall and S. Kirkpatrick, \"Passwords You’ll Never Forget, but Can’t Recall,\" in Proceedings of Conference on Human Factors in Computing Systems (CHI). Vienna, Austria: ACM, 2004. [8] Real User Corporation, Passfaces TM http://www.realuser.com, January 2007. [9] S. S. Ganorkar ,Prof. H. V. Vyawahare, “Review Paper On Graphical Password Authentication Techniques “ Volume 5, Issue 03, March -2018. [10] D. Davis, F. Monrose, and M. K. Reiter, \"On user choice in graphical password schemes,\" in Proceedings of the 13thUsenix Security Symposium. San Diego, CA, 2004. [11] G. E. Blonder. Graphical password. U.S. Patent 5559961, Lucent Technologies, Inc. (Murray Hill, NJ), August 1995. [12] D. Hong, S. M an, B. Hawes, and M. Mathews, “A password scheme strongly resistant to spyware”, In Proceedings of International conference. [13] Xiaoyuan Suo, Ying Zhu, and G. Scott Owen. Graphical passwords: A survey. In Proceedings of Annual Computer Security Applications Conference, pages 463–472, 2005. [14] R. Dhamija and A. Perrig. “Déjà vu: A User Study Using Images for Authentication”, In Proceedings of the USENIX Security Symposium, 2000. [15] Sobrado, L and Birget, J. “Graphical Passwords”, The Rutgers Scholar, An Electronic Bulletin of Undergraduate Research, Ruthgers University, New Jersey, Vol.4, 2004. [16] S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, “Authentication Using Graphical Passwords: Basic Results”, In Human-Computer Interaction International (HCII 2005), Las Vegas, NV, 2005. [17] M. G. Tuscano and A. Tulasyan, “Graphical password authentication using pass faces,” International Journal of Engineering Research and Applications, vol. 5, no. 3, pp. 60–64, 2015. [18] S. Man, D. Hong, and M. M. Matthews, “A shoulder-surfing resis-tant graphical password scheme-wiw.,” in Security and Management, pp. 105–111, Citeseer, 2003. [19] G. Blonder, “Graphical Password”, In Lucent Technologies, Inc., M urray Hill, NJ, United States Patent 5559961, 1996. [20] P. R. D. Shrikala, M. Deshukh and A. B. Pawar, “Persuasive Cued Click Points with Click Draw Based Graphical Password Scheme”, International Journal of Soft Computing and Engineering, Vol.3, Issue-2 May 2013. [21] R. Dhamija and A. Perrig, \"Deja Vu: A User Study Using Images for Authentication\" in Proceedings of 9 USENIX Security Symposiums, 2000. [22] S. Chiasson, P. van Oorschot, and R. Biddle, “Graphical Password Authentication Using Cued Click Points,” Proc. European Symp. Research in Computer Security (ESORICS), pp. 359-374, Sept. 2007. [23] J. Yan, A. Blackwell, R. Anderson, and A. Grant, “The Memorability and Security of Passwords,” Security and Usability: Designing Secure Systems That People Can Use, L. Cranor and S. Garfinkel, eds., ch. 7, pp. 129-142, O’Reilly Media, 2005. [24] L.O’Gorman, “Comparing Passwords, Tokens, and Biometrics for User Authentication,” Proc. IEEE, vol. 91, no. 12, pp. 2019 2020, Dec. 2003. [25] A. Jain, A. Ross, and S. Pankanti, “Biometrics: A Tool for Information Security,” IEEE Trans. Information Forensics and Security (TIFS), vol. 1, no. 2, pp. 125-143, June 2006. [26] S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon. \"PassPoints: Design and evaluation of a graphical password system\", International Journal of Human-Computer Studies, 2011. [27] P. Golle and D. Wagner. “Cryptanalysis of a cognitive authentication scheme”, IEEE Symposium on Security and Privacy, May 2007. [28] L. Sobrado and J.-C. Birgit. \"Graphical passwords,\" The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research, vol. 4, 2002. [29] I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin. \"The Design and Analysis of Graphical Passwords,\" Proceedings of the 8th USENIX Security Symposium, 1999. [30] R. Dhamija and A. Perrig. \"Deja Vu: A User Study Using Images for Authentication,\" Proceedings of 9th USENIX Security Symposium, 2000.
Copyright © 2023 Utkarsh Bhardwaj, Vishal Krishna, Tanya , Sudhanshu Verma, Dr. (Prof.) Ragini Karwayun. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET51883
Publish Date : 2023-05-09
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here