Security analysis method of recognition-based graphical password
One of the most important primitive security mechanisms is the authentication system. Authentication through the use of password is a commonly utilized mechanism for authentication of users. In general, users utilize characters as their password; however, passwords based on texts are hard to recall...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Published: |
Penerbit UTM Press
2015
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/55374/ http://dx.doi.org/10.11113/jt.v72.3941 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utm.55374 |
---|---|
record_format |
eprints |
spelling |
my.utm.553742017-11-01T04:17:02Z http://eprints.utm.my/id/eprint/55374/ Security analysis method of recognition-based graphical password Khodadadi, Touraj Alizadeh, Mojtaba Gholizadeh, Somayyeh Zamani, Mazdak Darvishi, Mahdi TA Engineering (General). Civil engineering (General) One of the most important primitive security mechanisms is the authentication system. Authentication through the use of password is a commonly utilized mechanism for authentication of users. In general, users utilize characters as their password; however, passwords based on texts are hard to recall and if the passwords are too simple and predictable, then there is the danger of being susceptible to threats. In order to overcome the problems with authentication, an alternative and new approach has been introduced utilizing images for passwords. The idea gains support from the knowledge that the human's brain is highly capable of remembering many detailed images, however remembering texts are more difficult. Users who utilize the graphic authentication carry out certain functions on the images such as to click, drag, and movement of the mouse and so on. This research reviews several common Recognition-Based graphical password methods and analyzes their security based on the estimation criteria. Moreover, the research defines a metric that would make it possible for the analysis of the security level of the graphical passwords that are Recognition-Based. Finally, a table comparing the limits of each method based on the security level is presented. Penerbit UTM Press 2015 Article PeerReviewed Khodadadi, Touraj and Alizadeh, Mojtaba and Gholizadeh, Somayyeh and Zamani, Mazdak and Darvishi, Mahdi (2015) Security analysis method of recognition-based graphical password. Jurnal Teknologi, 72 (5). pp. 57-62. ISSN 0127-9696 http://dx.doi.org/10.11113/jt.v72.3941 DOI:10.11113/jt.v72.3941 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
topic |
TA Engineering (General). Civil engineering (General) |
spellingShingle |
TA Engineering (General). Civil engineering (General) Khodadadi, Touraj Alizadeh, Mojtaba Gholizadeh, Somayyeh Zamani, Mazdak Darvishi, Mahdi Security analysis method of recognition-based graphical password |
description |
One of the most important primitive security mechanisms is the authentication system. Authentication through the use of password is a commonly utilized mechanism for authentication of users. In general, users utilize characters as their password; however, passwords based on texts are hard to recall and if the passwords are too simple and predictable, then there is the danger of being susceptible to threats. In order to overcome the problems with authentication, an alternative and new approach has been introduced utilizing images for passwords. The idea gains support from the knowledge that the human's brain is highly capable of remembering many detailed images, however remembering texts are more difficult. Users who utilize the graphic authentication carry out certain functions on the images such as to click, drag, and movement of the mouse and so on. This research reviews several common Recognition-Based graphical password methods and analyzes their security based on the estimation criteria. Moreover, the research defines a metric that would make it possible for the analysis of the security level of the graphical passwords that are Recognition-Based. Finally, a table comparing the limits of each method based on the security level is presented. |
format |
Article |
author |
Khodadadi, Touraj Alizadeh, Mojtaba Gholizadeh, Somayyeh Zamani, Mazdak Darvishi, Mahdi |
author_facet |
Khodadadi, Touraj Alizadeh, Mojtaba Gholizadeh, Somayyeh Zamani, Mazdak Darvishi, Mahdi |
author_sort |
Khodadadi, Touraj |
title |
Security analysis method of recognition-based graphical password |
title_short |
Security analysis method of recognition-based graphical password |
title_full |
Security analysis method of recognition-based graphical password |
title_fullStr |
Security analysis method of recognition-based graphical password |
title_full_unstemmed |
Security analysis method of recognition-based graphical password |
title_sort |
security analysis method of recognition-based graphical password |
publisher |
Penerbit UTM Press |
publishDate |
2015 |
url |
http://eprints.utm.my/id/eprint/55374/ http://dx.doi.org/10.11113/jt.v72.3941 |
_version_ |
1643653778126143488 |
score |
13.211869 |