Sunteți pe pagina 1din 5

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056

Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072

Graphical Password Authentication Using Image Segmentation


Rohitkumar Kolay, Animesh Vora, Vinaykumar Yadav
Department of Information Technology,
Universal College of Engineering, Vasai, Maharashtra, India

---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Authentication is performed using passwords authentication system with extensive findings to
that are alphanumeric in nature. However, users find it support it. Graphical password authentication can be
difficult in remembering a password that is long and needs to implemented using two techniques - Recall based and
be recalled again and again while implementing it. Instead, Recognition based. The basic idea of using the image
they create short, simple, and insecure passwords that make segmentation system is that using images as a security
the user’s data vulnerable to outside attacks. Graphical will lead to high memorability and decrease the
passwords provide a way out of this dilemma by making
chances to choose insecure passwords. This, in turn,
passwords more rememberable and easier for people to use as
a password and, therefore, makes it more secure. Using a should increase overall password security. Our primary
graphical password, users clicks on images rather than typing question is the following: Are graphical passwords
text passwords which contains alphanumeric characters. A competitive to alphanumeric passwords in terms of
new and more secure graphical password system has been security, performance and retention?
developed which uses image segmentation. The image
segmentation system presents the user with an image upon 1.1 Background and Related work
which the user selects a number of grids on this image; when
entered in a proper sequence these points authenticate the We refer to the security and usability problems
user. The findings showed alphanumeric passwords and
involved with alphanumeric passwords as ‘‘the
graphical passwords both worked in similar time but the
graphical passwords were easier to recall and remember.[1] password problem.’’ The problem rises because
Thus, Graphical passwords were found to be hard to crack as passwords are expected to act with two conflicting
they are newly implemented and not many algorithms have requirements, namely: (1)Passwords should be easy to
been devised to break through them.
remember, and the authentication protocol should be
Key Words: Authentication, Encryption, Graphical, executable quickly and easily by humans. (2)
Password, Image, Login, Segmentation Passwords should be secure, i.e. they should be hard to
guess and should look random; they should be changed
frequently, and it should be different on different or
1.INTRODUCTION multiple accounts of the same user; they should not be
written down or stored in plain text. Meeting such
[1]Computer, network, data and information security
requirements is almost impossible for users. The
has been consider as a major technical problem faced
nowadays. However, it is now widely recognized and problem is well known in the security community.
accepted that most security mechanisms cannot Classical studies going back over 25 years[5] have
succeed without taking into account the user’s views shown that, as a result, human users tend to choose
[2].Various graphical password schemes are used as and handle alphanumeric passwords insecurely.
alternatives to alphanumeric passwords [3]. Research Recent studies confirm these results[6]. The password
has shown that alphanumeric passwords are filled with problem arises primarily from fundamental limitations
both security and usability problems that make them
of human’s long-term memory (LTM). Once a password
less than desirable solutions [4]. A key area in security
research is authentication which deals with the has been chosen and learned the user must be able to
determination of whether a particular user should be remember and recall it to log in. However, people
granted access to a given system or resource. This usually forget their passwords. The Power Law of
paper aims at providing understanding about a new Forgetting describes rapid forgetting soon after
graphical password authentication system using image learning, followed by very slow drop-off thereafter[7].
segmentation. The significance of this study paper is
Psychological theories have attributed forgetting to
the comprehension of a flexible graphical password
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1694
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072

decay through the passage of time and to interference, the user with a set of images and the user is asked to
in which new items in memory interrupt existing ones recognize and identify the images he selected during
(retroactive interference). A recent review emphasizes the registration stage. One such example which lies
the importance of retroactive interference in everyday between Recall and Recognition based techniques is
forgetting[8]. Decay and interference help to explain the Passpoint technique. The system allows any
why people forget passwords. Users are expected to random image to be used which should enable to have
learn and recall a password and remember it over time. many possible click points. The role of the image is just
However, other items in memory compete with the to provide a clue to the user which helps in
password and makes it difficult to recall. If a password remembering the click points. During login, the click
is not used frequently it will be especially susceptible points should be selected in the same order asit was in
to forgetting. Recent research has shown that when registration phase inside some adjustable tolerable
users fail to recall a password, they often are able to distance. This is very time consuming and requires to
recall parts of it correctly[9]. However, the use of recall those certain points. The setbacks attached to
passwords in the password authentication is this technique can be addressed by using the image
predicated on completely accurate recall, so a partially segmentation system. Image segmentation is a recall
correct password has no value now. Furthermore, based system as it offers a point which should establish
today users have many passwords for computers, context and trigger the stored memory[13].
networks, web sites, and many more. In addition, some
system requires frequent password changes, in a
1.2 Image Segmentation: A new graphical
probably misguided effort to increase security. This use password scheme
of passwords increases potential interference and is
likely to lead either to forgetting passwords or PassPoints Scheme is similar in many respects to the
forgetting in which system a password is associated Blonder’s scheme but uses only a single image. This
with. What is a user to do? Most often a user will scheme is flexible because it allows to use any type of
decrease the burden in its memory at the expense of image i.e it may either be provided by the system or
security. Perhaps most commonly, the user will write chosen by the user. The proposed system allows user
down passwords and keep them in a convenient place, to change to put an image as its password and only the
which will prevent in compromising of the passwords. user knows what image he or she has put in. On
One approach to increasing password security is receiving the image, the system segments the image
education of the[10]. However, given the mismatch into an array of images in the grid format and stores
between passwords and human capabilities, the them accordingly. The next time, the user logs on to the
likelihood of fundamental change is not great[11]. A system, the segmented image is received by the system
better way to overcome the password problem is to in a jumbled order. Now if users chooses parts of an
develop password systems that reduces thel memory image in an order so as to make the original image he
problems while preserving security. Recall based sent, the user is considered authenticate. Else the user
techniques ask the user to recreate something that is not considered authentic. The only practical
he/she has previously created in the registration stage. requirement in selecting a particular image is that an
An example of Recall based system includes Draw-A- image should not comprise of a major portion of a
Secret scheme which asks user to draw a simple single coloured object. For example: a wall or the
picture on a 2-D grid at the time of registration and it picture of sea or ocean or a cloudless sky. That way, it
stores the co-ordinates of the grid in the order that it will be not be easy for the user to guess the right
has been drawn. This technique has a drawback sequence of grids to form a complete image. Rather an
attached to it-Redrawing the image has to touch the image should be rich in content and contain various
same grids in exactly the same sequence during components and objects that define a pattern only
authentication. Recognition based techniques present recognizable to the user.

© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1695
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072

and deployed in systems where online attacks are not


possible, and where any attack made against an online
system can limit the number of guesses made per
account in a given time period. We assume that all
communication between the server and client will be
made securely through SSL, maintaining security of
selected click-points and corresponding images,
therefore avoiding simple attacks based on network
sniffing. We suggest that the image mappings be done
on a per-user basis as a function of the username i.e.
grant a different image to different groups of people
Fig -1: Original Image based on their username. We also suggest that the
image set across all users is a multiple set containing a
very large number of images and that users are
assigned a subset of these images for their image-maps.
Attacks against such a system, where attackers try to
break into any account [16], are slowed due to the
precautions mentioned above. Hotspot analysis might
be used to increase the efficiency of an attack
dictionary but images are need to be collected and such
dictionary would need to be generated on a per user
basis. Online attacks against specific users are more
bothersome and require further examination.

Shoulder-surfing and other information capture from


Fig -1: Segmented Image with sequence clues
users. Most graphical passwords schemes are
vulnerable to shoulder-surfing attacks [17]. With
2. DISCUSSION today’s small cameras and camera phones, it is easy to
capture a video of a user’s screen or keyboard as they
Image segmentation has the security advantage of a are logging in. Image segmentation is also susceptible
large password space over alphanumeric passwords. It to such attacks and its present form the change in
also has an advantage in password space over Blonder- images may be easier to see from further away than
style graphical passwords and recognition-based mouse pointer movements in Image segmentation.
graphical password, such as Passfaces. In spite of the With knowledge of which images to look for in systems
difficulties at the beginning of the implementation of allowing sufficient numbers of guesses, attackers could
graphical password authentication system, after some try a brute-force attack of clicking on random grids
practice the users would feel comfortable until the correct sequence is achieved. If the username
implementing either alphanumeric or graphical based and the grid sequence are observed through shoulder-
password as input. The people using graphical surfing then an attacker has all of the information
password authorization would be able to enter the needed to access the account, as is the case with most
password correctly with a much faster pace after they other password systems. Having a compromised
have improved with practice. This reflects that only a computer is also a threat because some malwares may
minority of graphical participants would have a serious capture the login information and relay that
difficulty in learning[15]. However, any authentication information elsewhere. Whereas a keylogger success
scheme needs to be evaluated in terms of possible for text passwords, for graphical passwords software is
threats. We recommend that Image be implemented
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1696
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072

needed to capture the images and the mouse cursor Segmentation is that it satisfies both conflicting
positions. When only limited information is known, it requirements that is, it is easy to remember and hard
can be used to narrow the search for a correct guess. to guess. In principle, this could be an ideal solution for
With the correct grid sequence, knowing the username all kinds of devices as opposed to the difficulty of
is enough to retrieve the user’s sole image. Hotspot typing a long, secure alphanumeric password on the
analysis [18] can only be conducted on that particular keyboard all the time. The challenge is to provide a
images thus the images provided by the servers are large enough password space on a small image.
safe from Hotspot analyzers. Thus Image segmentation However, this might be handled by magnifying an area
is not suitable in environments where shoulder-surfing of the image when the user moves his finger to a given
is a realistic threat, or environments where user area of the screen. In conclusion, Image Segmentation
images can be recorded (e.g., by insiders, malicious seems to hold out the prospect of a much more secure
software on the client machine, etc.). system as it is easy to gain large passwords spaces,
based on complex, natural images. This reduces the
Hotspots and dictionary attacks. In some of the cases chance of an attacker being able to guess passwords.
where attackers are not in a position to capture The second most important thing this paper aims at is
information from the user, they are limited to what the usability of Image Segmentation, the Image
they can conclude through image analysis. Hotspots are Segmentation provides for the user not requiring to
specific areas in the image that have a higher remember the different passwords. Psychological
probability of being selected as part of their passwords research indicates that interference can cause
by users. If attackers can accurately predict the remarkable memory problems[8]. Security research
hotspots in an image, then it becomes easier to built a [10] confirms that users have difficulty in remembering
dictionary of passwords containing combinations of multiple passwords and produce unsafe practices to
these hotspots. Hotspots are known to be problematic overcome the problem (writing passwords down, etc.)
for Image segmentation [19]; further analysis is needed
to determine whether precautions such as carefully REFERENCES
selecting grids can minimize this threat. A key
[1] Birget, J.C., Hong, d., Memon, N.Robust discretization,
advantage of Image Segmentation over any other with application to graphical passwords. Cryptology
graphical password authentication is that it is feasible ePrint Archive,
to brute force and dictionary attacks. It also provides a http://eprint.iacr.org/2003/168, accessed Jan 17,2005
M. Young, The Technical Writer’s Handbook. Mill Valley,
way of making more human friendly but strong CA: University Science, 1989.
passwords. For example, if a user selects an image of [2] Brown, A.S., Bracken, E., Zoccoli, S. and Douglas,
buildings he is familiar with. That way, not only does a K.Generating and remembering passwords. Applied
Cognitive Psychology 18 (2004), 641-651.
user is easily able to arrange the grids in the proper [3] Boroditsky, M.Passlogix Password Schemes.
sequence but also manage to protect its data from http://www.passlogix.com. Accessed Dec. 2, 2002.
infiltrators. As a result, the security of the system is
very high. The major disadvantage however is that it [4] Brostoff, S. and Sasse, M.A. Are Passfaces more usable
than passwords: A field trial investigation. In People and
takes a lot of time to register and log in to the system. Computers XIV - Usability or Else: Proceedings of HCI
2000 (Bath, U.K., Sept. 8-12, 2000).
3. CONCLUSIONS AND FUTURE WORK [5] Adams, A. and Sasse, M.A. Users are not the enemy.
CACM 42, 12 (1999), 41-46.
[6] Blonder, G.E. Graphical passwords. United States Patent
In conclusion, the study of Image segmentation 5559961, (1996).
indicates its strengths and weaknesses. Graphical [7] Bradley, M.M., Grenwald, M.K., Petry, M.C. and Lang, P.J.
Remembering pictures: Pleasure and arousal in
password users would be able to easily create a valid memory. Journal of Experimental Psychology 81, 2
password, but they would have to shell out more (1992), 379-390.
storage space than alphanumeric users, taking more [8] Bahrick, H.P. semantic memory content in permastore:
Fifty years of memory for Spanish learned in school.
trails and time. An area of interest with using Image

© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1697
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072

Journal of Verbal Learning and Verbal Behavior 14 BIOGRAPHIES


(1984), 1-24.
[9] Borges, M.A., Stepnowsky, M.A., and Holt, L.H. Recall and
recognition of words and pictures by adults and
children. Bulletin of the Psychonomic Society 9, 2 Mr. Rohitkumar Kolay is
(1977), 113-114. currently completing B.E in
[10] Biederman, I., Glass, A.L. and Stacy, E.W. Searching for Information technology from the
objects in real world scenes. Journal of Experimental Universal College of Engineering,
Psychology 97 (1973), 22-27. Vasai, Mumbai University,
[11] S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and Mumbai, India.
N.Memon, “PassPoints: design and longitudinal
evaluation of agraphical password system,” Int. Journal
of HCI, vol. 63,2005, pp. 102–127.
[12] Real User Corporation. The science behind Passfaces.
Whitepaper, Mr. Animesh Vora is
http://www.realuser.com/published/ScienceBehindPas currently completing B.E in
sfaces.pdf, accessed Feb. 2012.
Information technology from the
[13] I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin,
“The design and analysis of graphical passwords,” in 8th Universal College of Engineering,
USENIX Security Symposium, 1999. Vasai, Mumbai University,
[14] H. Tao and C. Adams, “Pass-Go: A proposal to improve Mumbai, India.
theusability of graphical passwords,” Int. Journal of
NetworkSecurity, vol. 7, no.
[15] P. C. van Oorschot and S. Stubblebine, “On countering
online dictionary attacks with login histories and
humans-in the- loop,” ACM Trans. Info. System Security,
vol. 9, no. 3,2006, pp. 235-258. Mr. Vinaykumar Yadav is
[16] L. von Ahn, M. Blum, N. J. Hopper, and J. Langford, currently completing B.E in
“Captcha: Using hard AI problems for security,” in Information technology from the
Eurocrypt, 2003, pp. 294-311. Universal College of Engineering,
[17] S. Chiasson, P. C. van Oorschot, and R. Biddle, “Graphical Vasai, Mumbai University,
password authentication using cued click points,” in Mumbai, India.
European Symposium on Research in Computer Security
(ESORICS), 2007, pp. 359-374.
[18] E. Stobert, A. Forget, S. Chiasson, et al. Exploring
usability effects of increasing security in click-based
graphical passwords. In Annual Computer Security
Applications Conference (ACSAC), 2010.
[19] Harsh Kumar Sarohi,Graphical Password Authentication
Schemes: Current Status and Key Issues, International
Journal of Computer Science Issues,2013, 437-443.
[20] S.Singh, G.Agrawal ”Integration of sound signature in
graphical password authentication system” Invertis
University Bareilly,India, January ,2011.

© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1698

S-ar putea să vă placă și