Browse > Article
http://dx.doi.org/10.14400/JDC.2014.12.5.231

A New Graphical Password Scheme Based on Universal Design  

Yang, Gi-Chul (Department of Multimedia Engineering, Mokpo National University)
Kim, Hwangyong (Department of Occupational Therapy, Gwangju University)
Publication Information
Journal of Digital Convergence / v.12, no.5, 2014 , pp. 231-238 More about this Journal
Abstract
Graphical passwords using images have been developed to solve problems in text based password recognition. The basic recognition process scheme of graphical passwords is clicking certain points on the screen image in correct order. In this pre-developed method of graphical passwords the recognition will fail if the precise positions are not clicked. A new graphical password system called PassPositions is introduced in this paper. PassPositions is a new graphical password scheme which is using relative positions never used earlier graphical password schemes. PassPositions is a graphical password scheme based on universal design that everybody can use conveniently without regarding their physical conditions.
Keywords
Graphical Passwords; Universal Design; Information Security; Personal Identification System;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "PassPoints: Design and longitudinal evaluation of a graphical password system," International Journal of Human Computer Studies, 63, pp. 102-127, 2005   DOI   ScienceOn
2 S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "Authentication using graphical passwords: Basic results," in Human-Computer Interaction International (HCII 2005). Las Vegas, NV, 2005
3 A. E. Dirik, N. Memon, J.C. Birget, "Modeling user choice in the PassPoints graphical password scheme", Symposium on Usable Privacy and Security(SOUPS), at Carnegie-Mellon Univ., Pittsburgh, July 2007
4 D. Hong, S. Man, B. Hawes, and M. Mathews, "A password scheme strongly resistant to spyware," in Proceedings of International conference on security and management. Las Vegas, NV, 2004.
5 S. Man, D. Hong, and M. Mathews, "A shoulder surfing resistant graphical password scheme," in Proceedings of International conference on security and management. Las Vegas, NV, 2003.
6 I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, "The Design and Analysis of Graphical Passwords," in Proceedings of the 8th USENIX Security Symposium, 1999.
7 J. Thorpe and P. C. v. Oorschot, "Graphical Dictionaries and the Memorable Space of Graphical Passwords," in Proceedings of the 13th USENIX Security Symposium. San Deigo, USA: USENIX, 2004.
8 A. F. Syukri, E. Okamoto, and M. Mambo, "A User Identification System Using Signature Written with Mouse," in Third Australasian Conference on Information Security and Privacy (ACISP): SpringerVerlag Lecture Notes in Computer Science (1438), 1998, pp. 403-441
9 Ahmad Almulhem, "A Graphical Password Authentication System", World Congress on Internet Security (WorldCIS-2011), London, UK, February 21-23, 2011.
10 R. Dhamija and A. Perrig, "Deja Vu: A User Study Using Images for Authentication," in Proceedings of 9th USENIX Security Symposium, 2000.
11 M. Kotadia, "Microsoft: Write down your passwords," in ZDNet Australia, May 23, 2005.
12 A. Jain, L. Hong, and S. Pankanti, "Biometric identification," Communications of the ACM, vol. 33, pp. 168-176, 2000.
13 Blonder, G., "Graphical passwords," in Lucent Technologies, Inc., Murray Hill, NJ, U. S. Patent, Ed. United States, 1996.
14 Ronald L. Mace, Graeme J. Hardie, Jaine P. Place, Accessible Environments: Toward Universal Design, a chapter in Design Intervention: Toward a More Humane Architecture, W.E. Preiser, JC. Vischer, E.T. White (Eds.). Van Nostrand Reinhold, New York, 1991.
15 Xiaoyuan Suo Ying Zhu G. Scott., Graphical Passwords: A Survey, In 21st Annual Computer Security Applications Conference(ACSAC), 2005.12.