Browse > Article
http://dx.doi.org/10.3837/tiis.2019.11.026

Development Status and Prospects of Graphical Password Authentication System in Korea  

Yang, Gi-Chul (Department of Convergence Software, Mokpo National University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.11, 2019 , pp. 5755-5772 More about this Journal
Abstract
Security is becoming more important as society changes rapidly. In addition, today's ICT environment demands changes in existing security technologies. As a result, password authentication methods are also changing. The authentication method most often used for security is password authentication. The most-commonly used passwords are text-based. Security enhancement requires longer and more complex passwords, but long, complex, text-based passwords are hard to remember and inconvenient to use. Therefore, authentication techniques that can replace text-based passwords are required today. Graphical passwords are more difficult to steal than text-based passwords and are easier for users to remember. In recent years, researches into graphical passwords that can replace existing text-based passwords are being actively conducting in various places throughout the world. This article surveys recent research and development directions of graphical password authentication systems in Korea. For this purpose, security authentication methods using graphical passwords are categorized into technical groups and the research associated with graphical passwords performed in Korea is explored. In addition, the advantages and disadvantages of all investigated graphical password authentication methods were analyzed along with their characteristics.
Keywords
Graphical password; Authentication; Computer security; Security attack;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 A. Adams and M. A. Sasse, "Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures," Communications of the ACM, vol. 42, pp.40-46, 1999.   DOI
2 R. N. Shepard, "Recognition memory for words, sentences and pictures 1," Journal of Verbal Learning and Verbal Behavior, vol. 6, pp.156-163, 1967.   DOI
3 Aviv, Adam J. Gibson, Katherine, Mossop, Evan, Blaze, Matt, Smith, Jonathan M., "Smudge Attacks on Smartphone Touch Screens," in Proc. of 4th USENIX Workshop on Offensive Technologies.
4 S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "PassPoints: Design and longitudinal evaluation of a graphical password system," International Journal of Human Computer Studies, vol. 63, pp. 102-127, 2005.   DOI
5 T. Seong, G.-W. Park and Y.-S. Byun, "A Study on Graphical Passwords," in Proc. of 26th KIPS Fall Conference, vol. 13, no. 2, 2006.
6 J.-W. Kim, S.-H. Kim, K. Kim and H.-G. Cho, "A Shoulder-Surfing Resistant Graphical Password Using Hangul Choseong," in Proc. of KISS Fall Conference, vol. 37, no. 2(A), pp. 95-96, 2010.
7 G.-C. Yang and H. Kim, "A New Graphical Password Scheme Based on Universal Design," Journal of Digital Convergence, vol. 12, no. 5, pp. 231-238, 2014.   DOI
8 S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "Authentication using graphical passwords: Basic results," in Proc. of Human-Computer Interaction International (HCII 2005), Las Vegas, NV, 2005.
9 G.-C. Yang, "PassPositions: A Secure and User-Friendly Graphical Password Scheme," in Proc. of the 4th International Conference on Computer Applications and Information Processing Technology (CAIPT) 2017, Bali, 2017.
10 Rachna Dhamija, Adrian Perrig, Deja Vu, "A User Study Using Images for Authentication," in Proc. of the 9th USENIX Security Symposium, Denver, Colorado, USA, August 14-17, 2000.
11 J. An, S. Kim, A. Kim and S.-H. Lee, "A Melody-based Authentication Scheme by using Piano Key and Score," in Proc. of the Korea Computer Conference, vol. 39, no. 1(C), 2012.
12 Kirkpatrick, E. A., "An experimental study of memory," Psychological Review, 1, 602-609, 1894.   DOI
13 S. Madigan, "Picture memory," In J. Yuille, editor, Imagery, Memory, and Cognition: Essays in Honor of Allan Paivio, chapter 3, pages 65-89, Lawrence Erlbaum Associates, 1983.
14 J.-W. Kim, S.-H. Kim, K. Kim and H.-G. Cho, "Improvement of the Grid-based Password System Resistant to Shoulder-Surfing Attacks, "Journal of KISS, vol. 17, no. 4, 2011.
15 G. Moon, J. Kim and M. Hong, "A Graphic Password Scheme using Eulerian Path," in Proc. of the Korea Computer Conference, vol. 38, no. 1(D), 2011.
16 G. Moon, J. Kim and M. Hong, "A Graphical Password Scheme Resistant to Shoulder-Surfing Attack in Mobile Environments," Journal of KISS, vol. 18, no. 1, 2012.
17 T. Kim, S. Kim, E. Park and J.H. Yi, "Minesweeper Game Based Password Authentication Scheme Resistant to Shoulder-Surfing Attack," in Proc. of 37th KIPS Spring Conference, vol. 19, no. 1, pp. 654-657, 2012.
18 G. Park, A. Kim and S.-H. Lee, "A Graphic Password Scheme based on Structure of Double Rings Resistant to Smudge and Shoulder Surfing Attack," in Proc. of the Korea Computer Conference, vol. 39, no. 1(C), 2012.
19 T. Ko, T. Shon and M. Hong, "A Study on the Korean-Stroke based Graphical Password Approach," Journal of KIISC, vol. 22, no. 2, pp. 189-200, 2012.
20 S.-H. Ju and H.-S. Seo, "A study on User Authentication Technology of Numeric based Pattern Password," Journal of the Korea Society of Computer and Information, vol. 17, no. 9, pp. 65-73, 2012.   DOI
21 T.E. Kim, H.H. Kim and M.S. Jun, "A study on the SmartPhone GPS based Graphical Password Approach," KIPS Transactions on Computer and Communications System, vol. 2, no. 12, pp. 525-532, 2013.   DOI
22 H. Jeong, A. Kim and S.-H Lee, "A Text-based Graphical Password by Using Titles on Book Covers," in Proc. of the Korea Computer Conference, vol. 41, no. 1, pp. 2000-2002, 2014.