Smart Authentication Using Graphical Password for Android Devices

  • Conference paper
  • First Online:
Emerging Research in Computing, Information, Communication and Applications (ERCICA 2016)

Abstract

Information has become the oxygen of the modern world. To keep information protected from the so-called ‘nefarious people’ we need security. There are multiple authentication systems for security like text-based, pin, biometrics, graphical, etc. However, the drawbacks of these are that the user tends to keep passwords, which are fairly easy to remember, and such passwords can thus be easily cracked. This paper mainly focuses on the picture password authentication system, which is an upcoming alternative authentication system. According to research, humans tend to recollect images better than text, this system promotes the user to select a password which is difficult to guess but at the same time, can be easily remembered. This paper also focuses on overcoming some drawbacks of Persuasive Cued Click Points (PCCP) , along with making the system more secure. The proposed system makes use of five images and captures one section from each of the selected images. For successful login, the users simply have to select the same sections on every image as decided earlier. Thus, users can be authenticated without having to input even a single character. To avoid brute force and any other bypass techniques, the users are allowed only three consecutive failed attempts. Upon failing those, the user account will be locked, and can be unlocked only after answering the registered security questions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 160.49
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 213.99
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
EUR 213.99
Price includes VAT (Germany)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Sayli Pradhan, Prachi Pandya, Rinita Nair, “Authentication using RFID and PCCP Application for Mobile Devices”, International Journal of Advance Research in Engineering and Technology, Vol. 3, Issue 3, March 2015.

    Google Scholar 

  2. Sonia Caisson, Member, IEEE, Elizabeth Stobert, Student Member, IEEE, Alain Forget,Robert Biddle, Member, IEEE, and Paul C. van Oorschot, Member, IEEE “Persuasive Cued Click Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism” IEEE Transactions on Dependable and Secure Computing, Vol. 9, No. 2, March/April 2012.

    Google Scholar 

  3. J. Yan, A. Blackwell, R. Anderson, and A. Grant, “The Memorability and Security of Passwords,” Security and Usability: Designing Secure Systems That People Can Use, L. Cranor and S. Garfinkel, eds., ch. 7, pp. 129–142, O’Reilly Media, 2005.

    Google Scholar 

  4. Nelson, D.L., U.S. Reed, and J.R. Walling. Picture Superiority Effect. Journal of Experimental Psychology: Human Learning and Memory 3, 485–497, 1977.

    Google Scholar 

  5. S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy, and N. Memon. “PassPoints: Design and longitudinal evaluation of a graphical password system”. International Journal of Human Computer Studies, 2005.

    Google Scholar 

  6. S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, “Authentication Using Graphical Passwords: Effects of Toler-ance and Image Choice,” Proc. First Symp. Usable Privacy and Se-curity (SOUPS), July 2005.

    Google Scholar 

  7. K. Golofit, “Click Passwords under Investigation,” Proc. 12th European Symp. Research in Computer Security (ESORICS), Sept. 2007.

    Google Scholar 

  8. Ms. Uma D.Yadav and Mr. P. S. Mohod,“Enhancement of Knowledge Based Authentication Mechanism using Graphical Password via Persuasion” Journal of Computer Science and Engineering, Volume 17, Issue 2, February 2013.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aaroh Gala .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gala, A., Mehta, S. (2018). Smart Authentication Using Graphical Password for Android Devices. In: Shetty, N., Patnaik, L., Prasad, N., Nalini, N. (eds) Emerging Research in Computing, Information, Communication and Applications. ERCICA 2016. Springer, Singapore. https://doi.org/10.1007/978-981-10-4741-1_40

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-4741-1_40

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-4740-4

  • Online ISBN: 978-981-10-4741-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation