Open Access Open Access  Restricted Access Subscription Access

A Comparison between Position-Based and Image-Based Multi-Layer Graphical User Authentication System


Affiliations
1 Department of Computer Science, Kebbi State University of Science & Technology Aliero, Nigeria
 

System security is very important, especially in the age that we live in. One of the ways to secure data is by creating a password that makes it difficult for unauthorized user to gain access to the system. However, what makes it difficult for the system to be attacked is directly dependent on approach used to create it, and how secured it is. Text based approach is the oldest authentication approach. It requires that the user supplies textual password in order to gain access to the system. However, this approach has shown a significant drawback and several vulnerabilities, one of which is the difficulty in recalling or remembering textual passwords. Several other attacks that textual passwords are vulnerable to include brute force attacks, shoulder spying, dictionary attacks etc. The introduction of graphical schemes made things a lot better. Graphical passwords make use of images. However, most graphical schemes are vulnerable to shoulder surfing attacks. In this research work, we developed two systems; A position-based multi-layer graphical user authentication system and an Image-based multi-layer graphical user authentication system. The reason behind this research work is to compare the two systems, and evaluate them based on three major performance metrics: (1) Security, (2) Reliability (3) Individual preference.

Keywords

Graphical User Authentication, Image-Based Security, Multi-Layer, Position-Based, Randomization, Shoulder Surfing Attack.
User
Notifications
Font Size

  • Vimal Gaur, A. S. (2017). Authentication using a Combination of Color Scheme and Musical Notes. International Journal of Engineering Research & Technology (IJERT), 1-5.
  • Harinandan Tunga, D. S. (2015). Graphical User Authentication Techniques for Security: A Comparative Study. International Journal of Engineering and Advanced Technology (IJEAT), 1-7.
  • Jiya Gloria Kaka, I. O. (2021). Recognition Based Graphical Password Algorithms: A Survey. 1-10.
  • Christina Katsini, Christos Fidas, Marios Belk, George Samaras, Nikolaos Avouris. (2019). A Human Cognitive Perspective of Users' Password Choices in Recognition-based Graphical Authentication. International Journal of Human-Computer Interaction, 1-24.
  • Adama Victor Ndako, O. I. (2021). Pure Recall-Based Graphical User Authentication Schemes: Perspectives from a Closer look. African Human-Computer Interaction Conference, 1-5.
  • Istyaq, S. (2016). Hybrid Authentication System using QR Code with OTP. International Journal of Computer and Information Engineering, 1-4.
  • Atish Nayak, R. B. (2016). Analysis of Knowledge Based Authentication System Using Persuasive Cued Click points. 7th International Conference on Communication, Computing and Virtualization, 1-8.
  • Murano, H. U. (2019). Security and User Interface Usability of Graphical Authentication Systems – A Review. International Journal of Computer Trends and Technology ( IJCTT ) - Volume 67 Issue 2, 1-21.
  • Amol Bhand, v. d. (2015). Enhancement of Password Authentication system using Graphical Images. International Conference on Information Processing (ICIP), 1-4.
  • Zhili Zhou, C.-N. Y. (2019). Polynomial-Based Google Map Graphical Password System against Shoulder-Surfing Attacks in Cloud Environment. Hindawi, 1-9.
  • Wang, Y. Z. (2020). A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity. Hindawi Security and Communication Networks, 1-19.
  • Sileyew, K. J. (2019). Research Design and Methodology. Intech Open, 1-14.
  • D. Weinshall and S. Kirk Patrick, Passwords you’ll never forget, but can’t recall, 2004, doi: 10.1145/985921.986074

Abstract Views: 257

PDF Views: 1




  • A Comparison between Position-Based and Image-Based Multi-Layer Graphical User Authentication System

Abstract Views: 257  |  PDF Views: 1

Authors

Audu Lovingkindness Edward
Department of Computer Science, Kebbi State University of Science & Technology Aliero, Nigeria
Hassan Suru
Department of Computer Science, Kebbi State University of Science & Technology Aliero, Nigeria
Mustapha Abubakar Giro
Department of Computer Science, Kebbi State University of Science & Technology Aliero, Nigeria

Abstract


System security is very important, especially in the age that we live in. One of the ways to secure data is by creating a password that makes it difficult for unauthorized user to gain access to the system. However, what makes it difficult for the system to be attacked is directly dependent on approach used to create it, and how secured it is. Text based approach is the oldest authentication approach. It requires that the user supplies textual password in order to gain access to the system. However, this approach has shown a significant drawback and several vulnerabilities, one of which is the difficulty in recalling or remembering textual passwords. Several other attacks that textual passwords are vulnerable to include brute force attacks, shoulder spying, dictionary attacks etc. The introduction of graphical schemes made things a lot better. Graphical passwords make use of images. However, most graphical schemes are vulnerable to shoulder surfing attacks. In this research work, we developed two systems; A position-based multi-layer graphical user authentication system and an Image-based multi-layer graphical user authentication system. The reason behind this research work is to compare the two systems, and evaluate them based on three major performance metrics: (1) Security, (2) Reliability (3) Individual preference.

Keywords


Graphical User Authentication, Image-Based Security, Multi-Layer, Position-Based, Randomization, Shoulder Surfing Attack.

References





DOI: https://doi.org/10.13005/ojcst16.01.03