Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Georgakakis, E.; Komninos, N.; Douligeris, C. (2012)
Publisher: IEEE
Languages: English
Types: Unknown
Subjects: QA75, QA76

Classified by OpenAIRE into

Text-based passwords, despite their well-known drawbacks, remain the dominant user authentication scheme implemented. Graphical password systems, based on visual information such as the recognition of photographs and / or pictures, have emerged as a promising alternative to the aggregate reliance on text passwords. Nevertheless, despite the advantages offered they have not been widely used in practice since many open issues need to be resolved. In this paper we propose a novel graphical password scheme, NAVI, where the credentials of the user are his username and a password formulated by drawing a route on a predefined map. We analyze the strength of the password generated by this scheme and present a prototype implementation in order to illustrate the feasibility of our proposal. Finally, we discuss NAVI’s security features and compare it with existing graphical password schemes as well as text-based passwords in terms of key security features, such aspassword keyspace, dictionary attacks and guessing attacks. The proposed scheme appears to have the same or better performance in the majority of the security features examined.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] C. Kuo, S. Romanosky, and L. Cranor 2006. Human selection of mnemonic phrase-based passwords. In Proceedings of the second symposium on Usable privacy and security (SOUPS '06). ACM, New
    • [2] G. Blonder, Graphical Password. In Lucent Technologies, Inc., Murray Hill, NJ, United States Patent 5559961, 1996.
    • [4] T. Takada, T. Onuki, and H. Koike 2006. Awase-e: Recognitionbased image authentication scheme using users' personal photographs. In Innovations in Information Technology. 2006 , vol., no., pp.1-5, Nov. 2006 doi:10.1109/INNOVATIONS.2006.301970
    • [5] E. Hayashi, R. Dhamija, N. Christin, and A. Perrig 2008. Use your illusion: secure authentication usable anywhere. In Proceedings of the 4th symposium on Usable privacy and security (SOUPS '08). ACM, New York, NY, USA, 35-45. doi:10.1145/1408664.1408670
    • [6] R. Dhamija, A. Perrig, 2000. Déjà Vu: a user study using images for authentication, In Proceedings of the 9th Conference on USENIX Security Symposium - Volume 9 (SSYM'00), Vol. 9. USENIX Association, Berkeley, CA, USA, 4-4.
    • [7] L. Sobrado and J. Birget, 2002. Graphical Passwords. The Rutgers Scholar , An Electronic Bulletin of Undergraduate Research, Rutgers University, New Jersey, Vol. 4 (2002)
    • [8] H. J. Asghar, S. Li, J. Pieprzyk, and H. Wang, 2010. Cryptanalysis of the convex hull click human identification protocol. In Proceedings of the 13th International Conference on Information security (ISC'10),. Springer-Verlag, Berlin, Heidelberg, 24-30. doi: 10.1007/978-3-642- 18178-8_3
    • [9] SFR IT - Engineering,
    • [10] S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, 2005. PassPoints: design and longitudinal evaluation of a graphical password system. Int. J. Hum.-Comput. Stud. 63, 1-2 (July 2005), 102-127. DOI=http://dx.doi.org/10.1016/j.ijhcs.2005.04.010.
    • [11] A. E. Dirik, N. Memon, and J.-C.Birget, 2007. Modeling user choice in the PassPoints graphical password scheme. In Proceedings of the 3rd Symposium on Usable privacy and security (SOUPS '07). ACM, New York, NY, USA, 20-28. DOI=http://doi.acm.org/10.1145/ 1280680.1280684
    • [12] J. Thorpeand and P. V. Oorschott , 2007. Human-seeded attacks and exploiting hot-spots in graphical passwords. In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium (SS'07), Niels Provos (Ed.). USENIX Association, Berkeley, CA, USA, , Article 8, 16 pages.
    • [13] I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter and A. D. Rubin, 1999. The design and analysis of graphical passwords. In Proceedings of the 8th Conference on USENIX Security Symposium - Volume 8 (SSYM'99), Vol. 8. USENIX Association, Berkeley, CA, USA, 1-1.
    • [14] F. A. Alsulaiman and A. El Saddik, 2008. Three-Dimensional Password for More Secure Authentication. In IEEE Transactions on Instrumentation and Measurement, , vol.57, no.9, pp.1929-1938, Sept. 2008. doi:10.1109/TIM.2008.919905
    • [15] V. Mhaske-Dhamdhere, G. A. Patil, 2010. Three Diamentional Object Used for Data Security. In International Conference on Computational Intelligence and Communication Networks (CICN), 2010, pp.403-408, 26-28 Nov. 2010. doi: 10.1109/CICN.2010.83
    • [16] P. Dunphy, A. P. Heiner, and N. Asokan 2010. A closer look at recognition-based graphical passwords on mobile devices. In Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS '10). ACM, New York, NY, USA, , Article 3 , 12 pages. doi:10.1145/1837110.1837114
    • [17] R. Biddle, S. Chiasson and P.C. Oorschot Version: October 2, 2009. Technical Report TR-09-09, School of Computer Science, Carleton University, Ottawa, Canada.
    • [18] K. Renaud, 2009. Guidelines for designing graphical authentication mechanism interfaces. In Int. J. Inf. Comput. Secur. 3, 1 (June 2009), pp. 60-85. doi:10.1504/IJICS.2009.026621
    • [19] M. D. Hafiz, A. H. Abdullah, N. Ithnin, and H. K. Mammi, 2008. Towards identifying usability and security features of graphical password in knowledge based authentication technique. In Modeling
    • [19] & Simulation, 2008. AICMS 08. Second Asia International Conference on , vol., no., pp.396-403, 13-15 May 2008. doi:10.1109/ AMS.2008.136
    • [20] F. Monrose and M. Reiter, 2005. Graphical passwords. In Security and Usability: Designing Secure Systems That People Can Use, L. Cranor and S. Garfinkel, Eds. O'Reilly Media, 2005, ch. 9, pp. 157- 174.
    • [21] X. Suo, Y. Zhu, and G. Owen, 2005. Graphical passwords: A survey. In Annual Computer Security Applications Conference (ACSAC'05), Dec. 2005. doi:10.1109/CSAC.2005.27
    • [22] P.C. Oorschot, A. Salehi-Abari and J. Thorpe, 2010. Purely Automated Attacks on PassPoints-Style Graphical Passwords. In IEEE Transactions on Information Forensics and Security, vol.5, no.3, pp.393-405, Sept. 2010, pp. 393 - 405, 2010. doi: 10.1109/ TIFS.2010.2053706
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article