Security analysis method of recognition-based graphical password

One of the most important primitive security mechanisms is the authentication system. Authentication through the use of password is a commonly utilized mechanism for authentication of users. In general, users utilize characters as their password; however, passwords based on texts are hard to recall...

Full description

Saved in:
Bibliographic Details
Main Authors: Khodadadi, Touraj, Alizadeh, Mojtaba, Gholizadeh, Somayyeh, Zamani, Mazdak, Darvishi, Mahdi
Format: Article
Published: Penerbit UTM Press 2015
Subjects:
Online Access:http://eprints.utm.my/id/eprint/55374/
http://dx.doi.org/10.11113/jt.v72.3941
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.55374
record_format eprints
spelling my.utm.553742017-11-01T04:17:02Z http://eprints.utm.my/id/eprint/55374/ Security analysis method of recognition-based graphical password Khodadadi, Touraj Alizadeh, Mojtaba Gholizadeh, Somayyeh Zamani, Mazdak Darvishi, Mahdi TA Engineering (General). Civil engineering (General) One of the most important primitive security mechanisms is the authentication system. Authentication through the use of password is a commonly utilized mechanism for authentication of users. In general, users utilize characters as their password; however, passwords based on texts are hard to recall and if the passwords are too simple and predictable, then there is the danger of being susceptible to threats. In order to overcome the problems with authentication, an alternative and new approach has been introduced utilizing images for passwords. The idea gains support from the knowledge that the human's brain is highly capable of remembering many detailed images, however remembering texts are more difficult. Users who utilize the graphic authentication carry out certain functions on the images such as to click, drag, and movement of the mouse and so on. This research reviews several common Recognition-Based graphical password methods and analyzes their security based on the estimation criteria. Moreover, the research defines a metric that would make it possible for the analysis of the security level of the graphical passwords that are Recognition-Based. Finally, a table comparing the limits of each method based on the security level is presented. Penerbit UTM Press 2015 Article PeerReviewed Khodadadi, Touraj and Alizadeh, Mojtaba and Gholizadeh, Somayyeh and Zamani, Mazdak and Darvishi, Mahdi (2015) Security analysis method of recognition-based graphical password. Jurnal Teknologi, 72 (5). pp. 57-62. ISSN 0127-9696 http://dx.doi.org/10.11113/jt.v72.3941 DOI:10.11113/jt.v72.3941
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic TA Engineering (General). Civil engineering (General)
spellingShingle TA Engineering (General). Civil engineering (General)
Khodadadi, Touraj
Alizadeh, Mojtaba
Gholizadeh, Somayyeh
Zamani, Mazdak
Darvishi, Mahdi
Security analysis method of recognition-based graphical password
description One of the most important primitive security mechanisms is the authentication system. Authentication through the use of password is a commonly utilized mechanism for authentication of users. In general, users utilize characters as their password; however, passwords based on texts are hard to recall and if the passwords are too simple and predictable, then there is the danger of being susceptible to threats. In order to overcome the problems with authentication, an alternative and new approach has been introduced utilizing images for passwords. The idea gains support from the knowledge that the human's brain is highly capable of remembering many detailed images, however remembering texts are more difficult. Users who utilize the graphic authentication carry out certain functions on the images such as to click, drag, and movement of the mouse and so on. This research reviews several common Recognition-Based graphical password methods and analyzes their security based on the estimation criteria. Moreover, the research defines a metric that would make it possible for the analysis of the security level of the graphical passwords that are Recognition-Based. Finally, a table comparing the limits of each method based on the security level is presented.
format Article
author Khodadadi, Touraj
Alizadeh, Mojtaba
Gholizadeh, Somayyeh
Zamani, Mazdak
Darvishi, Mahdi
author_facet Khodadadi, Touraj
Alizadeh, Mojtaba
Gholizadeh, Somayyeh
Zamani, Mazdak
Darvishi, Mahdi
author_sort Khodadadi, Touraj
title Security analysis method of recognition-based graphical password
title_short Security analysis method of recognition-based graphical password
title_full Security analysis method of recognition-based graphical password
title_fullStr Security analysis method of recognition-based graphical password
title_full_unstemmed Security analysis method of recognition-based graphical password
title_sort security analysis method of recognition-based graphical password
publisher Penerbit UTM Press
publishDate 2015
url http://eprints.utm.my/id/eprint/55374/
http://dx.doi.org/10.11113/jt.v72.3941
_version_ 1643653778126143488
score 13.211869