Prevention of shoulder-surfing attacks using shifting condition using digraph substitution rules

05/11/2023
by   Amanul Islam, et al.
0

Graphical passwords are implemented as an alternative scheme to replace alphanumeric passwords to help users to memorize their password. However, most of the graphical password systems are vulnerable to shoulder-surfing attack due to the usage of the visual interface. In this research, a method that uses shifting condition with digraph substitution rules is proposed to address shoulder-surfing attack problem. The proposed algorithm uses both password images and decoy images throughout the user authentication procedure to confuse adversaries from obtaining the password images via direct observation or watching from a recorded session. The pass-images generated by this suggested algorithm are random and can only be generated if the algorithm is fully understood. As a result, adversaries will have no clue to obtain the right password images to log in. A user study was undertaken to assess the proposed method's effectiveness to avoid shoulder-surfing attacks. The results of the user study indicate that the proposed approach can withstand shoulder-surfing attacks (both direct observation and video recording method).The proposed method was tested and the results showed that it is able to resist shoulder-surfing and frequency of occurrence analysis attacks. Moreover, the experience gained in this research can be pervaded the gap on the realm of knowledge of the graphical password.

READ FULL TEXT

page 4

page 5

page 6

page 7

research
10/07/2011

A Probabilistic Approach for Authenticating Text or Graphical Passwords Using Back Propagation

Password authentication is a common approach to the system security and ...
research
06/29/2018

SemanticLock: An authentication method for mobile devices using semantically-linked images

We introduce SemanticLock, a single factor graphical authentication solu...
research
10/02/2022

iCTGAN–An Attack Mitigation Technique for Random-vector Attack on Accelerometer-based Gait Authentication Systems

A recent study showed that commonly (vanilla) studied implementations of...
research
12/10/2011

A Novel Approach for Password Authentication Using Bidirectional Associative Memory

Password authentication is a very important system security procedure to...
research
04/29/2019

Typer vs. CAPTCHA: Private information based CAPTCHA to defend against crowdsourcing human cheating

Crowdsourcing human-solving or online typing attacks are destructive pro...
research
08/02/2019

Investigating Direct Manipulation of Graphical Encodings as a Method for User Interaction

We investigate direct manipulation of graphical encodings as a method fo...
research
05/22/2019

Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating

In this work, we investigate the concept of biometric backdoors: a templ...

Please sign up or login with your details

Forgot password? Click here to reset