2010
DOI: 10.2139/ssrn.2829284
|View full text |Cite
|
Sign up to set email alerts
|

A New Graphical Password Scheme Resistant to Shoulder-Surfing

Abstract: Abstract-Shoulder-surfing is a known risk where an attacker can capture a password by direct observation or by recording the authentication session. Due to the visual interface, this problem has become exacerbated in graphical passwords. There have been some graphical schemes resistant or immune to shoulder-surfing, but they have significant usability drawbacks, usually in the time and effort to log in. In this paper, we propose and evaluate a new shoulder-surfing resistant scheme which has a desirable usabili… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0
1

Year Published

2013
2013
2020
2020

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 14 publications
0
11
0
1
Order By: Relevance
“…In this research, we aim to develop a method where a password as well as a picture hand-drawn by the user are needed during the login process. This is different from other existing image authentication mechanisms [5,6], which only allow users to choose a pre-defined picture rather than letting them draw by themselves.…”
Section: Introductionmentioning
confidence: 89%
“…In this research, we aim to develop a method where a password as well as a picture hand-drawn by the user are needed during the login process. This is different from other existing image authentication mechanisms [5,6], which only allow users to choose a pre-defined picture rather than letting them draw by themselves.…”
Section: Introductionmentioning
confidence: 89%
“…Their study results proved the superiority of retention of multiple graphical passwords over multiple PINs and that mnemonics could aid even the recall of multiple graphical passwords. The use of mnemonics and degraded images in a recognition-based system was also studied in [60]. This scheme, which borrowed its ideas from the story scheme, used a trace line across both the user's pass-images and the distractor images, to safeguard against the shoulder-surfing problem.…”
Section: Page 24mentioning
confidence: 99%
“…The user is then expected to click on these click points in exactly the same order as they did during registration in order to authenticate. The click points scheme is considered a cued recall based system and is one of the most studied graphical authentication systems today [60]. The difference between the new system and the system proposed by Blonder is that this system does not impose any restrictions on click points.…”
Section: A the Passpoints Schemementioning
confidence: 99%
“…This approach also makes it easier to memorize the password, simpler to use and has more security. Given the two assumptions that humans can recall images better than numbers and words and the notion that a picture is more valuable than a thousand "passwords", software companies and psychological researches appear to concur with this approach [16][17][18]. Searchmetric or Cognometric systems, also called Recognition-Based systems, request users to learn and recall image portfolios during password generation, and next in order to log in, identify pictures among the decoys.…”
Section: Introductionmentioning
confidence: 99%