Home > Computer science essays > A review on novel approach for graphical user authentication

Essay: A review on novel approach for graphical user authentication

Essay details and download:

  • Subject area(s): Computer science essays
  • Reading time: 11 minutes
  • Price: Free download
  • Published: 30 October 2015*
  • Last Modified: 23 July 2024
  • File format: Text
  • Words: 3,156 (approx)
  • Number of pages: 13 (approx)

Text preview of this essay:

This page of the essay has 3,156 words.

ABSTRACT
Textual-based password authentication scheme tends to be more vulnerable to attacks such as shoulder surfing and hidden camera, eves dropping, dictionary attacks, social engineering. To overcome the vulnerabilities of traditional methods, visual or graphical password schemes have been developed as possible alternative solutions to text-based password schemes. Most of the graphical schemes are vulnerable to shoulder surfing. To address this problem, text can be combined with images or colors to generate session passwords for authentication. Session passwords can be used only once and every time a new password is generated. In this paper, we introduce a new authentication techniques ‘Pure recall-based’ and Cued recall-based techniques.
Keywords- graphical password; authentication; Pass doodle; Grid Selection; Pass-Go; VisKey SFR
1. INTRODUCTION
Authentication is the first step of information security. Authentication refers to the process of confirming or denying an individual’s claimed identity. Authentication schemes require users to memorize the passwords and recall them during log-in time. The most common user authentication method is the text-based password scheme that a user enters a login name and a password. The vulnerabilities of this method have been well known. Users tend to pick short password or passwords that are easy to remember, which makes the passwords vulnerable for attackers to break. To resist brute force search and dictionary attacks, users are required to use long and random passwords. Unfortunately, such passwords are hard to remember. Furthermore, textual password is vulnerable to shoulder-surfing, hidden camera and spyware attacks. Graphical password schemes have been proposed as a possible alternative to text-based schemes, motivated partially by the fact that humans can remember pictures better than text . In addition, the possible password space of a graphical password scheme may exceed that of text based schemes and thus presumably offer higher level of security. It is also difficult to devise automated attacks for graphical passwords. As a result, graphical password schemes provide a way of making more human-friendly passwords while increasing the level of security. Due to these advantages, there is a growing interest in graphical password. However, existing graphical passwords are far from perfect. Typically, system requirements and communication costs for graphical passwords are significantly higher than text-based passwords. In addition, few graphical systems support keyboard inputs. More importantly, most current graphical passwords are more vulnerable to shoulder-surfing attacks than textual passwords. In this paper, Using pure recall-based techniques and Cued Recall Based Techniques, a user is asked to reproduce something that he or she created or selected earlier during the registration stage.
2. GRAPHICAL AUTHENTICATION MECHANISM
The following are main methods of authentications:
a. Token based authentication.
b. Biometrics based authentication.
c. Knowledge based authentication.
Token-based techniques, such as key cards, bank cards and smart cards are widely used. Many token-based authentication systems also use knowledge-based techniques to enhance security. For example, ATM cards are generally used together with a PIN number. Biometric based authentication techniques, such as fingerprints, iris scans, or facial recognition has been developed due to uniqueness properties of biometrics. These systems are very secure. The major drawback of this approach is that such systems can be expensive, and the identification process can be slow and often unreliable. Knowledge based techniques are the most widely used authentication techniques and include both text-based and picture-based passwords. The picture-based techniques can be further divided into two categories: recognition -based and recall-based graphical techniques. Using recognition-based techniques, a user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he or she selected during the registration stage. Using pure recall-based techniques and Cued Recall Based Techniques, a user is asked to reproduce something that he or she created or selected earlier during the registration stage.
3. RELATED WORK
Many graphical authentication schemes have been proposed.
Dhamija and Perrig[1] proposed a graphical authentication scheme where the user has to identify the pre-defined images to prove user’s authenticity. This system is vulnerable to shoulder-surfing. Jermyn, et al. [3] proposed a new technique called ‘Draw- a-Secret’ (DAS), where the user is required to re-draw the pre-defined picture on a 2D grid. If the drawing touches the same grids in the same sequence, then the user is authenticated. This authentication scheme is vulnerable to shoulder surfing. Blonder [5] designed a graphical password scheme where the user must click on the approximate areas of pre-defined locations. Passlogix [6] extended this scheme by allowing the user to click on various items in correct sequence to prove their authenticity. Wiedenback et al [8] describes a graphical password entry scheme using convex hull method towards Shoulder Surfing attacks. A user needs to recognize pass-objects and click inside the convex hull formed by all the pass-objects. Passface [2] is a technique where the user sees a grid of nine faces and selects one face previously chosen by the user. Here, the user chooses four images of human faces as their password and the users have to select their pass image from eight other decoy images. Since there are four user selected images it is done for four times. Haichang et al [7] proposed a new shoulder-surfing resistant scheme in which the user is required to draw a curve across their password images orderly rather than clicking on them directly. This graphical scheme combines DAS and Story schemes to provide authenticity to the user. To overcome the shoulder-surfing problem, and hidden camera, eves dropping, dictionary attacks, social engineering two techniques are proposed in this paper i.e. Pure Recall Based Techniques, and Cued Recall Based Techniques.
4. PURE RECALL BASED TECHNIQUES
Users reproduce their passwords, without having the chance to use the reminder marks of system. Although easy and convenient, it appears that users do not quite remember their passwords. Following are some of the algorithms which were created based on this technique.
4.1. Passdoodle
This is a graphical password which is made up of handwritten designs or text that is normally drawn with a stylus onto a touch sensitive screen. According Jermyn et al. (1999) cracking the doodles is harder because they have a theoretically much larger number of possible doodle passwords than text passwords. A sample of a Passdoodle password is shown in Figure1.
Figure 1. An example of a Passdoodle
Usability wise the Passdoodle is not widely used because it has problems with recognition. What’s more the limits of the system are predefined by the length and identifiable features of the doodle. In addition to this only a predetermined amount of computer differentiable doodles can be created and the doodle is the only means of identification. In terms of security maintenance, the system cannot merely authenticate a user who records a very similar doodle, a minimum threshold of likeliness and similarity must be attained. This enhances security by preventing authentication of users who use random and obvious guessing.
On the other hand speed and accuracy are still top priorities for the system. Thus a complex recognition design that needs hundreds of training samples and approximately one minute of computation to authenticate does not justify the purpose of the original pervasive design. After careful consideration the proposed system applies a combination of doodle velocity and distribution mapping to recognize and authenticate a doodle (Christopher, 2004).
Weaknesses: According to (Christopher, 2004), people could recall doodle images as accurately as they would at alphanumeric passwords. However, such people would not be able to recall the order in which they drew a doodle than the resulting image. On the other hand, users were found to be interest by the doodles drawn by other users, and often entered other users’ login details simply to discover a variance of the set of doodles from their own (Karen, 2008).
4.2. Grid Selection
In 2004, a research was conducted on the complexity of the DAS technique based on password length and stroke count by Thorpe and Orschot. Their study showed that the item which has the greatest effect on the DAS password space is the number of strokes. This means that for a fixed password length, if a few strokes are selected then the password space will significantly decrease. To enhance security, Thorpe and Orschot created a ‘Grid Selection’ technique. As shown in Figure 2, the selection grid has a large rectangular region to zoom in on, from the grid which the user selects their key for their password. This definitely increases the DAS password space (Muhammad Daniel et al. 2008).
Figure 2. Grid selection
Weaknesses: Whilst this method significantly increases the DAS password space, the deficiencies in DAS have not been resolved (Muhammad Daniel et al. 2008).
4.3. Syukri
The Syukri algorithm proposes a system where authentication is achieved by the user using a mouse to draw their signature as can be seen in Figure 3 (Di et al., 2007). 2. This technique is made up of two stages, namely, registration and verification. To start with, during the registration stage the user is requested to draw their signature with a mouse, this is then followed by the system extracting the signature area and either enlarging or scaling-down signatures, and rotating if required, (also known as normalizing). Subsequent to this, the information is stored into the database. The verification stage begins by obtaining the user input, on which it repeats the normalization; thereafter it extracts the parameters of the signature. Basically the system uses geometric average means and a dynamic update of the database for verification purposes. Based on the study (Ali, 2008) undertaken, the rate of successful verification was satisfying. The major benefit to this approach is that not only is there no requirement for memorization of one’s signature but counterfeit signatures is difficult to come up with. Lack(s): However, since a good number of people are unfamiliar with using the mouse as a writing device; the signature can therefore prove to be difficult to draw. To resolve this drawback a pen-like input device could be employed. Since such devices are not extensively used, adding them as new hardware to the current system could turn out to be expensive (Ali, 2008). Although researchers from this study, believe that such a technique can still be more useful on small devices.
Figure 3. A Sample of Syukri Algorithm
5. Cued Recall Based Techniques
Here, the system provides a framework of reminders, hints and gestures for the users to reproduce their passwords or make a reproduction that would be much more accurate. Following are some of the algorithms which were created based on this technique.
5.1. Passmap
A major drawback to using passwords is that very good passwords are difficult to commit to memory and the ones that are easy to remember are too short and simple to be secure. All in all studies on human memory indicate that it is quite straightforward to remember landmarks on a well-known journey. As such one can opt to use a map as an alternative. For instance using the map of Europe a user who has never been to Europe before should have no difficulty in remembering that he would like to one day see the Eiffel Tour in Paris, the Big Ben in London and the Kremlin in Moscow and his PassMap might be to visit all of them one at a time flying in from his hometown (Roman, 2007). Lack(s): It is obvious that the PassMap technology is not very susceptible to “shoulder surfing” attacks. This is due to the fact that the ability to notice a single new edge or the absence of some edge in a large graph requires a high level of concentration. However Brute Force attacks are very likely and one has to consider how good those mechanisms are in terms of how easy to remember the PassMap password is (Roman, 2007).
Weaknesses: This algorithm like the others suffers from some weaknesses. Firstly, when the password is selected by the mouse, it is simple for the attacker to observe the password. The other drawback of this algorithm is the long login time and long process through registration phase which causes this algorithm to be slower than textual password authentication (Furkan et al. 2006).
5.2. Pass-Go
In 2006, this scheme being created as an improvement of the DAS algorithm, keeping the advantages of the DAS whilst adding some extra security features. Pass- Go is a grid-based scheme which requires a user to select intersections, instead of cells, thus the new system refers to a matrix of intersections, rather than cells as in DAS (Figure 4).
Figure 4. Pass-Go Algorithm
5.3. VisKey SFR
A company called SFR from Germany recently commercialized the VisKey scheme which is a recallbased authentication scheme. The creation of a password in this scheme requires the user to tap their spots in sequence (Figure 5) (Muhammad et al., 2008). The VisKey scheme was original purposed for mobile devices such as PDAs. Lack(s): This scheme’s main drawback is the input tolerance. Pointing to the exact spots on the picture has proven to be quite hard thus Viskey accepts all input within a certain tolerance area around it. It also allows users to set the size of this area in advance. However, some caution related to the input precision needs to be taken, since it will directly influence the security and the usability of the password. In order to practically set parameters, a four spot VisKey theoretically provides approximately 1 billion possibilities for defining a password. Unfortunately this is not large enough to prevent off-line attacks from a high-speed computer. Therefore no less than seven defined spots are required to overcome the likelihood of brute force attacks (Muhammad et al., 2008).
Figure 5. A Sample of VisKey SFR Algorithm
6. COMMON ATTACKS ON GRAPHICAL PASSWORDS
All the articles on graphical schemes that cover common attacks are thus explained further (Arash et al., 2009).
6.1 Password brute forcing attack
In this attack, which has the attack pattern ID 112, the attacker tries every possible value for a password until they succeed (Common Attack, 2009). A brute force attack, if feasible computationally, will always be successful because it will essentially go through all possible passwords given the alphabet used and the maximum length of the password. A system will be vulnerable to this type of an attack if it does not have a proper mechanism to ensure that passwords are strong and comply with an adequate password policy. In practice, a pure brute force attack on passwords is rarely used, unless the password is suspected to be weak. The speed with which an attacker discovers a secret is directly related to the resources that the attacker has. This attack method is resource expensive as the attackers’ chance for finding user’s password is high only if the resources be as complete as possible.
6.2. Dictionary based password attack
In this attack which has the attack pattern ID 16, an attacker tries each of the words in a dictionary as passwords to gain access to the system via some user’s account. If the password chosen by the user was a word within the dictionary, this attack will be successful. This is a specific instance of the password brute forcing attack pattern.
6.3. Spyware attack
Except for a few exceptions, key logging or key listening spyware can not be used to break graphical passwords. It is not clear whether ‘mouse tracking’ spyware will be an effective tool against graphical passwords. However, mouse motion alone is not enough to break graphical passwords. Such information has to be correlated with application information, such as window position and size, as well as timing information.
6.4. Shoulder surfing attack
Like text based passwords, most of the graphical passwords are vulnerable to shoulder surfing. At this point, only a few recognition-based techniques are designed to resist shoulder-surfing. None of the recall-based based techniques are considered should-surfing resistant.
6.5. Social engineering attack
In this kind of attack an attacker uses human interaction to obtain or compromise information about an organization or computer systems, while claiming to be one of employees in order to gain identity. On the other hand, the attacker tries to ask many questions in order to infiltrate an organization’s security. If an attacker is not able to gather enough information from one source, he or she may contact another source within the same organization and rely on the information from the first source to add to his or her credibility.
7. CONCLUSION
The past decade has seen a growing interest in using graphical passwords as an alternative to the traditional text-based passwords. In this paper, Pure Recall-Based and Cued Recall-Based graphical password authentication algorithms were reviewed. From all these algorithms we were able to come up with a number of shortcomings that can allow attacks to be perpetuated. The current graphical password techniques can be classified into two categories: recognition-based and recall-based techniques. The main argument for graphical passwords is that people are better at memorizing graphical passwords than text-based passwords, the existing user studies are very limited and there is not yet convincing evidence to support this argument. Our preliminary analysis suggests that it is more difficult to break graphical passwords using the traditional attack methods such as brute force search, dictionary attack, or spyware. However, since there is not yet wide deployment of graphical password systems, the vulnerabilities of graphical passwords are still not fully understood. Overall, the current graphical password techniques are still immature. Much more research and user studies are needed for graphical password techniques to achieve higher levels of maturity and usefulness.
8. ACKNOWLEDGMENTS
We would like to express our appreciation to our parents and all the teachers and lecturers who helped us to understand the importance of knowledge and show us the best way to gain it.
9. REFERENCES
[1] R. Dhamija, and A. Perrig. ‘D??j?? Vu: A User Study Using Images for Authentication’. In 9th USENIX Security Symposium, 2000.
[2] Real User Corporation: Passfaces. www.passfaces.com
[3] Jermyn, I., Mayer A., Monrose, F., Reiter, M., and Rubin., ‘The design and analysis of graphical passwords’ in Proceedings of USENIX Security Symposium, August 1999.
[4] Arash Habibi Lashkari may, 2010 ‘a new algorithm for graphical user authentication based on rotation and resizing’,
[5] G. E. Blonder, “Graphical Passwords,” In Lucent Technologies, Inc., Murray Hill, Nj, U. S. Patent, Ed. United States, 1996.
[6] Passlogix, site http://www.passlogix.com.
[7] Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang Liu Uwe Aickelin, ‘A New Graphical Password Scheme Resistant to Shoulder-Surfing.
[8] S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy, N. Memon, ‘Design and longitudinal evaluation of a graphical password system’. International J. of Human-Computer Studies 63 (2005) 102127.
[9] Arash Habibi Lashkari1*, Abdullah Gani1, Leila Ghasemi Sabet2 and Samaneh Farmand1 ‘A new algorithm on Graphical User Authentication (GUA) based on multi-line grids’.
[10] M Sreelatha 1, M Shashi 2, M Anirudh 1, MD Sultan Ahamer 1, V Manoj Kumar, ‘Authentication Schemes for Session Passwords using Color and Images’.
[11] Xiaoyuan Suo Ying Zhu G. Scott. Owen, ‘Graphical Passwords: A Survey’
[12] D. Hong, S. Man, B. Hawes, and M. Mathews, “A password scheme strongly resistant to spyware,” in Proceedings of International conference on security and management. Las Vergas, NV, 2004.
[13] S. Man, D. Hong, and M. Mathews, “A shouldersurfing resistant graphical password scheme,” in Proceedings of International conference on security and management. Las Vegas, NV, 2003.
[14] Gajbhiye S.K.1* and Ulhe P.2, ‘Authentication Schemes For Session Passwords Using Color And Gray-Scale Images’

About this essay:

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, A review on novel approach for graphical user authentication. Available from:<https://www.essaysauce.com/computer-science-essays/essay-a-review-on-novel-approach-for-graphical-user-authentication/> [Accessed 16-04-26].

These Computer science essays have been submitted to us by students in order to help you with your studies.

* This essay may have been previously published on EssaySauce.com and/or Essay.uk.com at an earlier date than indicated.