2019
DOI: 10.9734/air/2019/v19i430126
|View full text |Cite
|
Sign up to set email alerts
|

Graphical User Authentication System Resistant to Shoulder Surfing Attack

Abstract: User authentication is one of the most significant issues in the field of Information Security. The most common and convenient authentication method used is the alphanumeric password  which has significant drawbacks. To overcome the vulnerabilities of traditional methods, graphical password schemes have been developed as possible alternative solutions to text-based scheme. A potential drawback of graphical password schemes is that they are more vulnerable to shoulder surfing than conventional alphanumeric text… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…Shoulder surfing refers to someone using direct observation techniques to capture passwords 29 . For example, someone watches over the user's shoulder because the user enters a password or records the user's input with an external device, like video cameras 28,30‐32 . Graphical authentication is generally more susceptible to shoulder surfing attacks than text‐based passwords.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Shoulder surfing refers to someone using direct observation techniques to capture passwords 29 . For example, someone watches over the user's shoulder because the user enters a password or records the user's input with an external device, like video cameras 28,30‐32 . Graphical authentication is generally more susceptible to shoulder surfing attacks than text‐based passwords.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Typically, password entropy does not measure the generated password security. But it's conceptually related to the difficulty of the password random guessing [16], [25]. And it's usually calculated as:…”
Section: Password Entropymentioning
confidence: 99%
“…where N represents the number of the digits in the password, L represents the number of possible digits that can be used to create the password [16], [25].…”
Section: Password Entropymentioning
confidence: 99%
See 1 more Smart Citation
“…With the advancement of the technologies, several other similar schemes are proposed, such as PassPoints [11], V-Go [12], PassMap [13], and so on. Among them, in the proposed scheme, PassPoints has been chosen to integrate with the PTC due to: i) human being can remember click-points more precisely over texts, which alleviate the memorability issue of the users and ii) it provides a larger password space; and thus, can tackle the brute force attack and guessing attack.…”
Section: Related Workmentioning
confidence: 99%