Authentication Scheme for Passwords using Color and Text

Authors(1) :-VIKAS B O

The most common method used for authentication is textual passwords. But textual passwords are in risk to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are helpless to shoulder surfing as well as it has higher storage and computational complexity. To address this problem, text can be combined with colors to generate passwords for authentication. The combination of color and text password with efficient matching between the two provides authentication as well as security to the user. Hence using the technique of integration with color and textual password is proposed to generate passwords which are resistant to shoulder surfing.

Authors and Affiliations

VIKAS B O
Department of Computer Science and Engineering, SCE Bangalore, Karnataka, India

Graphical passwords, Recognition-based, Cued- recall based, Pure-recall based authentication scheme.

  1. Meng, Y. (2012, June). Designing click-draw based graphical password scheme for better authentication. In Networking, Architecture and Storage (NAS), 2012 IEEE 7th International Conference on (pp. 39-48). IEEE.
  2. Hu, W., Wu, X., & Wei, G. (2010, October). The security analysis of graphical passwords. In Communications and Intelligence Information Security (ICCIIS), 2010 International Conference on (pp. 200-203). IEEE.
  3. Ma, Y., & Feng, J. (2011, August). Evaluating usability of three authentication methods in web-based application. In Software Engineering Research, Management and Applications (SERA), 2011 9th International Conference on(pp. 81-88). IEEE.
  4. Eljetlawi, A. M., & Ithnin, N. (2008, November). Graphical password: Comprehensive study of the usability features of the recognition base graphical password methods. In Convergence and Hybrid Information Technology, 2008. ICCIT'08. Third International Conference on (Vol. 2, pp. 1137-1143). IEEE.
  5. Lashkari, A. H., Towhidi, F. A. R. N. A. Z., Saleh, R., & Farmand, S. (2009, December). A complete comparison on pure and cued recall-based graphical user authentication algorithms. In Computer and Electrical Engineering, 2009. ICCEE'09. Second International Conference on (Vol. 1, pp. 527-532). IEEE.
  6. Wiedenbeck, S., Waters, J., Birget, J. C., Brodskiy, A., & Memon, N. (2005, July). Authentication using graphical passwords: effects of tolerance and image choice. In Proceedings of the 2005 symposium on Usable privacy and security(pp. 1-12). ACM.
  7. Suo, X., Zhu, Y., & Owen, G. S. (2005, December). Graphical passwords: A survey. In Computer Security Applications Conference, 21st Annual (pp. 10-pp). IEEE.
  8. Wiedenbeck, S., Waters, J., Birget, J. C., Brodskiy, A., & Memon, N. (2005, July). Authentication using graphical passwords: effects of tolerance and image choice. In Proceedings of the 2005 symposium on Usable privacy and security(pp. 1-12). ACM.
  9. Gao, H., Liu, X., Wang, S., Liu, H., & Dai, R. (2009, December). Design and analysis of a graphical password scheme. In Innovative Computing, Information and Control (ICICIC), 2009 Fourth International Conference on (pp. 675-678). IEEE.
  10. Almulhem, A. (2011, February). A graphical password authentication system. In2011 World Congress on Internet Security (WorldCIS-2011) (pp. 223-225).

Publication Details

Published in : Volume 1 | Issue 3 | May-June 2015
Date of Publication : 2015-06-25
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 316-323
Manuscript Number : IJSRSET151363
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

VIKAS B O, " Authentication Scheme for Passwords using Color and Text, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 3, pp.316-323, May-June-2015.
Journal URL : http://ijsrset.com/IJSRSET151363

Follow Us

Contact Us