Abstract
Information has become the oxygen of the modern world. To keep information protected from the so-called ‘nefarious people’ we need security. There are multiple authentication systems for security like text-based, pin, biometrics, graphical, etc. However, the drawbacks of these are that the user tends to keep passwords, which are fairly easy to remember, and such passwords can thus be easily cracked. This paper mainly focuses on the picture password authentication system, which is an upcoming alternative authentication system. According to research, humans tend to recollect images better than text, this system promotes the user to select a password which is difficult to guess but at the same time, can be easily remembered. This paper also focuses on overcoming some drawbacks of Persuasive Cued Click Points (PCCP) , along with making the system more secure. The proposed system makes use of five images and captures one section from each of the selected images. For successful login, the users simply have to select the same sections on every image as decided earlier. Thus, users can be authenticated without having to input even a single character. To avoid brute force and any other bypass techniques, the users are allowed only three consecutive failed attempts. Upon failing those, the user account will be locked, and can be unlocked only after answering the registered security questions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Sayli Pradhan, Prachi Pandya, Rinita Nair, “Authentication using RFID and PCCP Application for Mobile Devices”, International Journal of Advance Research in Engineering and Technology, Vol. 3, Issue 3, March 2015.
Sonia Caisson, Member, IEEE, Elizabeth Stobert, Student Member, IEEE, Alain Forget,Robert Biddle, Member, IEEE, and Paul C. van Oorschot, Member, IEEE “Persuasive Cued Click Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism” IEEE Transactions on Dependable and Secure Computing, Vol. 9, No. 2, March/April 2012.
J. Yan, A. Blackwell, R. Anderson, and A. Grant, “The Memorability and Security of Passwords,” Security and Usability: Designing Secure Systems That People Can Use, L. Cranor and S. Garfinkel, eds., ch. 7, pp. 129–142, O’Reilly Media, 2005.
Nelson, D.L., U.S. Reed, and J.R. Walling. Picture Superiority Effect. Journal of Experimental Psychology: Human Learning and Memory 3, 485–497, 1977.
S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy, and N. Memon. “PassPoints: Design and longitudinal evaluation of a graphical password system”. International Journal of Human Computer Studies, 2005.
S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, “Authentication Using Graphical Passwords: Effects of Toler-ance and Image Choice,” Proc. First Symp. Usable Privacy and Se-curity (SOUPS), July 2005.
K. Golofit, “Click Passwords under Investigation,” Proc. 12th European Symp. Research in Computer Security (ESORICS), Sept. 2007.
Ms. Uma D.Yadav and Mr. P. S. Mohod,“Enhancement of Knowledge Based Authentication Mechanism using Graphical Password via Persuasion” Journal of Computer Science and Engineering, Volume 17, Issue 2, February 2013.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Gala, A., Mehta, S. (2018). Smart Authentication Using Graphical Password for Android Devices. In: Shetty, N., Patnaik, L., Prasad, N., Nalini, N. (eds) Emerging Research in Computing, Information, Communication and Applications. ERCICA 2016. Springer, Singapore. https://doi.org/10.1007/978-981-10-4741-1_40
Download citation
DOI: https://doi.org/10.1007/978-981-10-4741-1_40
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-4740-4
Online ISBN: 978-981-10-4741-1
eBook Packages: EngineeringEngineering (R0)