Abstract
Authentication receives enormous consideration from the research community and is proven to be an interesting field in today’s era. User authentication is the major concern because people have their private data on devices. To strengthen user authentication, passwords have been introduced. In the past, the text-based password was the traditional way of authentication, but this method has particular shortcomings. The graphical password has been introduced as an alternative, which uses a picture or a set of pictures to generate a password. In the future, it is a requirement of such approaches to maintain robustness and consume fewer energy resources to become suitable for the Green Internet of Things (IoT). Similarly, diverse graphical password authentication mechanisms have been used to provide users with better security and usability. In this article, we conduct an extensive survey on the existing approaches of graphical password authentication to highlight the challenges required to be addressed for Green IoT. In comparison to other existing surveys, the objective is to consolidate the graphical password technique and to identify the problem associated with it. Besides, this survey will also identify the vulnerabilities of the graphical password against several potential attacks. We have also examined the strengths and weaknesses of each technique along with the future research directions. This study also evaluates the usability of each approach by considering learnability, memorability, and so forth and also presents a comparative analysis with security.
- [1] . 2018. Reliable application enhanced framework (RAEF) for frenzie application upon a frenzy cloud overlay architecture for presence services using biometrics through smartphones. Journal of Excellence in Computer Science and Engineering 4, 1 (2018), 1–10.Google Scholar
Cross Ref
- [2] . 2018. Biometrics: In search of identity and security (Q & A). IEEE MultiMedia 25, 3 (2018), 22–35.Google Scholar
Digital Library
- [3] . 2004. Image based registration and authentication system. In Proceedings of Midwest Instruction and Computing Symposium, Vol. 4. 5.Google Scholar
- [4] . 2018. An alignment-free cancelable fingerprint template for bio-cryptosystems. Journal of Network and Computer Applications 115 (2018), 20–32.Google Scholar
Digital Library
- [5] . 2020. On the security weaknesses in password-based anonymous authentication scheme for e-health care. In Design Frameworks for Wireless Networks. Springer, 23–40.Google Scholar
Cross Ref
- [6] . 2018. Privacy and security issues in online social networks. Future Internet 10, 12 (2018), 114.Google Scholar
Cross Ref
- [7] . 2020. ALPHA: An anonymous orthogonal code-based privacy preserving scheme for industrial cyber physical systems. IEEE Transactions on Industrial Informatics 17, 11 (2020), 7716–7724.Google Scholar
Cross Ref
- [8] . 2020. FTM-IoMT: Fuzzy-based trust management for preventing Sybil attacks in internet of medical things. IEEE Internet of Things Journal 8, 6 (2020), 4485–4497.Google Scholar
Cross Ref
- [9] . 2006. A novel 3d graphical password schema. In Proceedings of 2006 IEEE International Conference on Virtual Environments, Human-Computer Interfaces and Measurement Systems. IEEE, 125–128. https://doi.org/10.1109/VECIMS.2006.250805Google Scholar
Cross Ref
- [10] . 2015. Graphical passwords in the wild: Understanding how users choose pictures and passwords in image-based authentication schemes. In Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services. 316–322. Google Scholar
Digital Library
- [11] . 2015. An efficient and practical smart card based anonymity preserving user authentication scheme for TMIS using elliptic curve cryptography. Journal of Medical Systems 39, 11 (2015), 180. Google Scholar
Digital Library
- [12] . 2018. An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks. Journal of Network and Computer Applications 104 (2018), 133–144.Google Scholar
Cross Ref
- [13] . 2020. Facial expression recognition algorithm based on parameter adaptive initialization of CNN and LSTM. Visual Computer 36, 3 (2020), 483–498.Google Scholar
Digital Library
- [14] . 2013. A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 1–6. https://doi.org/10.1145/2462096.2462098 Google Scholar
Digital Library
- [15] . 2018. An exploration of graphical password authentication for children. International Journal of Child-Computer Interaction 18 (November 2018), 37–46.Google Scholar
Cross Ref
- [16] . 2014. Understanding visual perceptions of usability and security of Android’s graphical password pattern. In Proceedings of the 30th Annual Computer Security Applications Conference. 286–295. Google Scholar
Digital Library
- [17] . 2019. Robusttrust–A pro-privacy robust distributed trust management mechanism for internet of things. IEEE Access 7 (2019), 62095–62106.Google Scholar
Cross Ref
- [18] . 2020. StabTrust—A stable and centralized trust-based clustering mechanism for IoT enabled vehicular ad-hoc networks. IEEE Access 8 (2020), 21159–21177.Google Scholar
Cross Ref
- [19] . 2019. Holitrust-A holistic cross-domain trust management mechanism for service-centric Internet of Things. IEEE Access 7 (2019), 52191–52201.Google Scholar
Cross Ref
- [20] . 2020. AgriTrust—A trust management approach for smart agriculture in cloud-based internet of agriculture things. Sensors 20, 21 (2020), 6174.Google Scholar
Cross Ref
- [21] . 2018. Flooding-based segmentation for contactless hand biometrics oriented to mobile devices. IET Biometrics 7, 5 (2018), 431–438.Google Scholar
Cross Ref
- [22] . 2016. Secure clustering for efficient data dissemination in vehicular cyber–physical systems. Future Generation Computer Systems 56 (2016), 476–492. Google Scholar
Digital Library
- [23] . 2020. 3D face authentication software test automation. IEEE Access 8 (2020), 46546–46558.Google Scholar
Cross Ref
- [24] . 2012. Biometric authentication and identification using keystroke dynamics: A survey. Journal of Pattern Recognition Research 7, 1 (2012), 116–139.Google Scholar
Cross Ref
- [25] . 2019. Iris feature extraction through wavelet mel-frequency cepstrum coefficients. Optics & Laser Technology 110 (2019), 13–23.Google Scholar
Cross Ref
- [26] . 2019. Big data security threats and prevention measures in cloud and hadoop. In Data Management, Analytics and Innovation. Springer, 143–156.Google Scholar
- [27] . 2020. Hand vein-based biometric authentication using two-channel similarity measure networks. In International SAUPEC/RobMech/PRASA Conference. (2020) Jan 29. IEEE, 1–6.Google Scholar
- [28] . 2017. Architectural design of token based authentication of MQTT protocol in constrained IoT device. In 2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA’17). IEEE, 1–4.Google Scholar
- [29] . 2016. PassBYOP: Bring your own picture for securing graphical passwords. IEEE Transactions on Human-Machine Systems 46, 3 (2016), 380–389. https://doi.org/10.1109/THMS.2015.2487511Google Scholar
Cross Ref
- [30] . 2009. Towards usable solutions to graphical password hotspot problem. In 33rd Annual IEEE International Computer Software and Applications Conference, 2009 (COMPSAC’09), Vol. 2. IEEE, 318–323. https://doi.org/10.1109/COMPSAC.2009.153 Google Scholar
Digital Library
- [31] . 2012. Graphical passwords: Learning from the first twelve years. ACM Computing Surveys (CSUR) 44, 4 (2012), 1–41. Google Scholar
Digital Library
- [32] . 1996. United States Patent 5559961. Graphical Passwords (1996). http://patents.com/us-5559961.html.Google Scholar
- [33] . 2002. Triboelectric device.
US Patent 6,335,856. Google Scholar - [34] . 2011. Mobile token-based authentication on a budget. In Proceedings of the 12th Workshop on Mobile Computing Systems and Applications. 14–19. Google Scholar
Digital Library
- [35] . 2020. Three-dimensional (3d) polygon mesh authentication using sequential bit substitution strategy. In Computational Intelligence in Data Mining. Springer, 617–627.Google Scholar
Cross Ref
- [36] . 2019. Examining security and usability aspects of knowledge-based authentication methods. In 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO’19). IEEE, 1181–1186.Google Scholar
- [37] . 2000. Are passfaces more usable than passwords? A field trial investigation. In People and Computers XIV—Usability or Else. Springer, 405–424. https://doi.org/10.1007/978-1-4471-0515-2_27Google Scholar
- [38] . 2018. Usability comparison of over-the-shoulder attack resistant authentication schemes. Journal of Usability Studies 13, 4 (2018), 19.Google Scholar
- [39] . 2008. A maximum entropy approach to feature selection in knowledge-based authentication. Decision Support Systems 46, 1 (2008), 388–398. Google Scholar
Digital Library
- [40] . 2008. Influencing users towards better passwords: Persuasive cued click-points. In Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction-Volume 1. British Computer Society, 121–130. Google Scholar
Digital Library
- [41] . 2011. Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism. IEEE Transactions on Dependable and Secure Computing 9, 2 (2011), 222–235. Google Scholar
Digital Library
- [42] . 2007. Graphical password authentication using cued click points. In ESORICS, Vol. 7. Springer, 359–374. https://doi.org/10.1007/978-3-540-74835-9_24 Google Scholar
Digital Library
- [43] . 2020. The need for information security. In Implementing an Information Security Management System. Springer, 1–20.Google Scholar
Cross Ref
- [44] . 2020. A comprehensive survey on model compression and acceleration. Artificial Intelligence Review 53, 7 (2020), 5113–5155.Google Scholar
Digital Library
- [45] . 2017. Multilayer graphical password authentication. International Journal of Innovative Research in Computer and Communication Engineering 5, 2 (2017), 1775–1779.Google Scholar
- [46] . 2020. An eye gaze-driven metric for estimating the strength of graphical passwords based on image hotspots. In Proceedings of the 25th International Conference on Intelligent User Interfaces. 33–37. Google Scholar
Digital Library
- [47] . 2018. On cultural-centered graphical passwords: Leveraging on users’ cultural experiences for improving password memorability. In Proceedings of the 26th Conference on User Modeling, Adaptation and Personalization. 245–249. Google Scholar
Digital Library
- [48] . 2015. A graphical password against spyware and shoulder-surfing attacks. In 2015 International Symposium on Computer Science and Software Engineering (CSSE’15). IEEE, 1–6. https://doi.org/10.1109/CSICSSE.2015.7369239Google Scholar
- [49] . 2004. A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics 50, 2 (2004), 629–631. Google Scholar
Digital Library
- [50] . 2020. Survey of security and privacy issues on biometric system. In Handbook of Computer Networks and Cyber Security. Springer, 763–776.Google Scholar
Cross Ref
- [51] . 2004. On user choice in graphical password schemes. In USENIX Security Symposium, Vol. 13. 11–11. Google Scholar
Digital Library
- [52] . 2005. Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. International Journal of Human-computer Studies 63, 1 (2005), 128–152 https://doi.org/10.1016/j.ijhcs.2005.04.020 Google Scholar
Digital Library
- [53] . 2015. Predicting graphical passwords. In International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, 23–35. Google Scholar
Digital Library
- [54] . 2000. Deja vu-A user study: Using images for authentication. In USENIX Security Symposium, Vol. 9. 4–4. Google Scholar
Digital Library
- [55] . 2019. Machine learning in the Internet of Things: Designed techniques for smart cities. Future Generation Computer Systems 100 (2019), 826–843.Google Scholar
Digital Library
- [56] . 2007. Do background images improve draw a secret graphical passwords? In Proceedings of the 14th ACM Conference on Computer and Communications Security. ACM, 36–47. https://doi.org/10.1145/1315245.1315252 Google Scholar
Digital Library
- [57] . 2018. Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing. Journal of Network and Computer Applications 109 (2018), 24–35. Google Scholar
Digital Library
- [58] . 2008. Graphical password: Prototype usability survey. In 2008 International Conference on Advanced Computer Theory and Engineering. IEEE, 351–355. Google Scholar
Digital Library
- [59] . 2011. Action-based graphical password: “Click-a-Secret.” In 2011 IEEE International Conference on Consumer Electronics (ICCE’11). IEEE, 265–266. https://doi.org/10.1109/ICCE.2011.5722575Google Scholar
- [60] . 2018. Interoperable, dynamic and privacy-preserving access control for cloud data storage when integrating heterogeneous organizations. Journal of Network and Computer Applications 108 (2018), 124–136. Google Scholar
Digital Library
- [61] . 2020. Adaptive trust management for soft authentication and progressive authorization relying on physical layer attributes. IEEE Transactions on Communications 68, 4 (2020), 2607–20.Google Scholar
Cross Ref
- [62] . 2006. A secure and performant token-based authentication for infrastructure and mesh 802.1 X networks. In IEEE Conference on Computer Communications (INFOCOM’06).Google Scholar
- [63] . 2013. Educating users to generate secure graphical password secrets: An initial study. In 2013 IEEE 5th Conference on Engineering Education (ICEED’13). IEEE, 26–31.Google Scholar
- [64] . 2019. A novel text-based user authentication scheme using pseudo-dynamic password. In Information and Communication Technology for Competitive Strategies. Springer, 177–186.Google Scholar
- [65] . 2020. Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues. Telecommunication Systems 73, 2 (2020), 317–348.Google Scholar
Digital Library
- [66] . 2019. Biometric technology solutions to countering today’s terrorism. In Violent Extremism: Breakthroughs in Research and Practice. IGI Global, 399–412.Google Scholar
Cross Ref
- [67] . 2006. Token-based authentication for network connection.
US Patent 7,134,140. Google Scholar - [68] . 2000. Authentication and supervision: A survey of user attitudes. Computers & Security 19, 6 (2000), 529–539. Google Scholar
Digital Library
- [69] . 2008. YAGP: Yet another graphical password strategy. In Annual Computer Security Applications Conference, 2008 (ACSAC’08). IEEE, 121–129. https://doi.org/10.1109/ACSAC.2008.19 Google Scholar
Digital Library
- [70] . 2019. Robust detection of median filtering based on combined features of difference image. Signal Processing: Image Communication 72 (2019), 126–133.Google Scholar
Digital Library
- [71] . 2011. Exploration of a hand-based graphical password scheme. In Proceedings of the 4th International Conference on Security of Information and Networks. ACM, 143–150. https://doi.org/10.1145/2070425.2070449 Google Scholar
Digital Library
- [72] . 2005. Biometrics: Getting back to business. Computerworld 9 (May 2005), 2005.Google Scholar
- [73] . 2003. Eigenface-domain super-resolution for face recognition. IEEE Transactions on Image Processing 12, 5 (2003), 597–606. Google Scholar
Digital Library
- [74] . 2020. Hybrid cryptographic technique to secure data in web application. Journal of Discrete Mathematical Sciences and Cryptography 23, 1 (2020), 125–135.Google Scholar
Cross Ref
- [75] . 2010. Content-based image authentication: Current status, issues, and challenges. International Journal of Information Security 9, 1 (2010), 19–32. Google Scholar
Digital Library
- [76] . 2006. The usage of graphical password as a replacement to the alphanumerical password. Jurnal Informatika 7, 2 (2006), 91–97.Google Scholar
- [77] . 2020. Semi-discrete optimal transport: A solution procedure for the unsquared Euclidean distance case. Mathematical Methods of Operations Research92 (2020), 133–163.Google Scholar
Cross Ref
- [78] . 2003. Criteria for evaluating usability evaluation methods. International Journal of Human-Computer Interaction 15, 1 (2003), 145–181.Google Scholar
Cross Ref
- [79] . 2020. RTS: A robust and trusted scheme for IoT-based mobile wireless mesh networks. IEEE Access 8 (2020), 68379–68390.Google Scholar
Cross Ref
- [80] . 2020. DDR-ESC: A distributed and data reliability model for mobile edge-based sensor-cloud. IEEE Access 8 (2020), 185752–185760.Google Scholar
Cross Ref
- [81] . 2019. Intrusion prevention framework for secure routing in WSN-based mobile Internet of Things. IEEE Access 7 (2019), 185496–185505.Google Scholar
Cross Ref
- [82] . 2019. Secret sharing-based energy-aware and multi-hop routing protocol for IoT based WSNs. IEEE Access 7 (2019), 79980–79988.Google Scholar
Cross Ref
- [83] . 2008. Use your illusion: Secure authentication usable anywhere. In Proceedings of the 4th Symposium on Usable Privacy and Security. ACM, 35–45. https://doi.org/10.1145/1408664.1408670 Google Scholar
Digital Library
- [84] . 2016. Privacy-preserving data aggregation scheme against internal attackers in smart grids. Wireless Networks 22, 2 (2016), 491–502. Google Scholar
Digital Library
- [85] . 2019. Dynamic knowledge-based authentication.
US Patent 10,362,016. Google Scholar - [86] . 2013. Intuitionistic fuzzy system for fingerprints authentication. Applied Soft Computing 13, 4 (2013), 2136–2142. Google Scholar
Digital Library
- [87] . 2019. A review on recognition-based graphical password techniques. In Computational Science and Technology. Springer, 503–512.Google Scholar
Cross Ref
- [88] . 2019. A blockchain-based fog computing framework for activity recognition as an application to e-Healthcare services. Future Generation Computer Systems 100 (2019), 569–578.Google Scholar
Digital Library
- [89] . 2000. Biometric identification. Communications of the ACM 43, 2 (2000), 90–98. https://doi.org/10.1145/328236.328110 Google Scholar
Digital Library
- [90] . 2003. Picture password: A visual login technique for mobile devices. NIST Interagency/Internal Report (NISTIR)-7030 (2003).Google Scholar
- [91] . 2018. Artificial intelligence and the future of work: Human-AI symbiosis in organizational decision making. Business Horizons 61, 4 (2018), 577–586.Google Scholar
Cross Ref
- [92] . 2018. Multimodal biometric authentication system using local hand features. In Advances in Machine Learning and Data Science. Springer, 325–336.Google Scholar
Cross Ref
- [93] . 2005. Usability assessment of academic digital libraries: Effectiveness, efficiency, satisfaction, and learnability. Libri 55, 2–3 (2005), 96–121.Google Scholar
Cross Ref
- [94] . 2011. A usability evaluation model for academic library websites: Efficiency, effectiveness and learnability. Journal of Library and Information Studies 9, 2 (2011), 11–26.Google Scholar
- [95] . 2018. An Enhanced Approach for Three Factor Remote User Authentication in Multi-Server Environment. Preprints 2018, 2018100151.
DOI : 10.20944/preprints201810.0151.v1.Google Scholar - [96] . 2018. Detecting malicious authentication events trustfully. In 2018 IEEE/IFIP Network Operations and Management Symposium (NOMS’18). IEEE, 1–6.Google Scholar
- [97] . 2014. A survey on multimodal biometric. International Journal of Computer Science and Information Technologies 5, 2 (2014), 2148–2151.Google Scholar
- [98] . 2019. Safe and convenient personal authentication method using Moiré 3D authentication based on biometric authentication. Cluster Computing 22, 1 (2019), 2017–2026.Google Scholar
Digital Library
- [99] . 2007. Restricted multimedia episode distribution with synthetically generated random outcomes to players with intra-episode biometric image based authentication.
US Patent 7,285,048. Google Scholar - [100] . 2019. An enhanced 3-tier multimodal biometric authentication. In 2019 International Conference on Computer Communication and Informatics (ICCCI’19). IEEE, 1–6.Google Scholar
- [101] . 2020. Remote multimodal biometric authentication using visual cryptography. In Proceedings of 3rd International Conference on Computer Vision and Image Processing. Springer, 13–25.Google Scholar
Cross Ref
- [102] . 2019. g-RAT| A novel graphical randomized authentication technique for consumer smart devices. IEEE Transactions on Consumer Electronics 65, 2 (2019), 215–223.Google Scholar
Digital Library
- [103] . 2020. Using augmented reality and deep learning to enhance Taxila museum experience. Journal of Real-Time Image Processing 18, 2 (2020), 321–322.Google Scholar
Digital Library
- [104] . 2020. Dynamic pricing in industrial internet of things: Blockchain application for energy management in smart cities. Journal of Information Security and Applications 55 (2020), 102615.Google Scholar
Cross Ref
- [105] . 2020. Development of integrated distance authentication and fingerprint authorization mechanism to reduce fraudulent online transaction. In Intelligent Communication, Control and Devices. Springer, 73–83.Google Scholar
- [106] . 2016. Evaluation of recognition-based graphical password schemes in terms of usability and security attributes. International Journal of Electrical and Computer Engineering 6, 6 (2016), 2939.Google Scholar
- [107] . 2018. Android system security evaluation. In 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC’18). IEEE, 1–2.Google Scholar
- [108] . 2018. Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection. Applied Soft Computing 62 (2018), 1077–1087.Google Scholar
Cross Ref
- [109] . 2004. New techniques for usability evaluation of mobile systems. International Journal of Human-Computer Studies 60, 5–6 (2004), 599–620.Google Scholar
Cross Ref
- [110] . 2020. Mean and median bias reduction in generalized linear models. Statistics and Computing 30, 1 (2020), 43–59.Google Scholar
Digital Library
- [111] . 2020. Accuracy comparison of classification techniques for mouse dynamics-based biometric CaRP. In Proceedings of the 3rd International Conference on Computational Intelligence and Informatics. Springer, 701–711.Google Scholar
Cross Ref
- [112] . 2019. An identity-based authentication framework for big data security. In Proceedings of 2nd International Conference on Communication, Computing and Networking. Springer, 63–71.Google Scholar
Cross Ref
- [113] . 2020. The support vector machine. In The Art and Science of Machine Intelligence. Springer, 45–76.Google Scholar
Cross Ref
- [114] . 2009. A survey on usability and security features in graphical user authentication algorithms. IJCSNS International Journal of Computer Science and Network Security 9, 9 (2009), 195–204.Google Scholar
- [115] . 2010. A new algorithm on graphical user authentication (GUA) based on multi-line grids. Scientific Research and Essays 5, 24 (2010), 3865–3875.Google Scholar
- [116] . 2009. The factor structure of the system usability scale. In International Conference on Human Centered Design. Springer, 94–103. Google Scholar
Digital Library
- [117] . 2020. Deep facial expression recognition: A survey. IEEE Transactions on Affective Computing (2020).Google Scholar
Cross Ref
- [118] . 2007. Graphical passwords & qualitative spatial relations. In Proceedings of the 3rd Symposium on Usable Privacy and Security. ACM, 161–162. https://doi.org/10.1145/1280680.1280708Google Scholar
Digital Library
- [119] . 2019. When human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. Computers & Security 80 (2019), 90–107.Google Scholar
Cross Ref
- [120] . 2001. Multipurpose watermarking for image authentication and protection. IEEE Transactions on Image Processing 10, 10 (2001), 1579–1592. Google Scholar
Digital Library
- [121] . 2007. Pseudo trust: Zero-knowledge based authentication in anonymous peer-to-peer protocols. In 2007 IEEE International Parallel and Distributed Processing Symposium. IEEE, 1–10.Google Scholar
- [122] . 2019. Leveraging cloud-based resources for automated biometric identification. In Biometric-Based Physical and Cybersecurity Systems. Springer, 437–454.Google Scholar
Cross Ref
- [123] . 2011. A fast eavesdropping attack against touchscreens. In 2011 7th International Conference on Information Assurance and Security (IAS’11). IEEE, 320–325.Google Scholar
- [124] . 2018. Graphical password using an intuitive approach. In International Conference on Intelligent Computing and Applications. Springer, 153–161. https://doi.org/10.1007/978-981-10-5520-1_15Google Scholar
- [125] . 2017. Robust authentication approach based on keyboard graphical password. Journal of Engineering and Applied Sciences 12, 7 (2017), 1738–1745.Google Scholar
- [126] . 2019. Multi-tier authentication schemes for fog computing: Architecture, security perspective, and challenges. International Journal of Communication Systems (2019), e4033.Google Scholar
Cross Ref
- [127] . 2019. Bayesian estimation of explained variance in ANOVA designs. Statistica Neerlandica 73, 3 (2019), 351–372.Google Scholar
Cross Ref
- [128] . 2019. Spammer detection and fake user identification on social networks. IEEE Access 7 (2019), 68140–68152.Google Scholar
Cross Ref
- [129] . 2020. Empirical investigation of usability evaluation methods for mobile applications using evidence-based approach. In Microservices in Big Data Analytics. Springer, 95–110.Google Scholar
Cross Ref
- [130] . 2018. TouchWB: Touch behavioral user authentication based on web browsing on smartphones. Journal of Network and Computer Applications 117 (2018), 1–9.Google Scholar
Cross Ref
- [131] . 2018. Image based authentication using zero-knowledge protocol. In 2018 4th International Conference on Computer and Technology Applications (ICCTA’18). IEEE, 202–210.Google Scholar
- [132] . 2019. A hybrid approach for secure iris-based authentication in IoT. In International Conference on Intelligent Computing and Communication Technologies. Springer, 159–167.Google Scholar
- [133] . 2018. Dynamic user authentication.
US Patent App. 10/027,662. Google Scholar - [134] . 2019. Detection of malicious and low throughput data exfiltration over the DNS protocol. Computers & Security 80 (2019), 36–53.Google Scholar
Cross Ref
- [135] . 2020. A general framework for shared control in robot teleoperation with force and visual feedback. In Special Topics in Information Technology. Springer, 119–131.Google Scholar
Cross Ref
- [136] . 2019. An evaluation model for recognition-based graphical password schemes. Journal of Information Assurance & Security 14, 3 (2019), 067–077.Google Scholar
- [137] . 2020. The epidemiological characteristics of an outbreak of 2019 novel coronavirus diseases (COVID-19) in China. Zhonghua Liu Xing Bing Xue Za Zhi= Zhonghua Liuxingbingxue Zazhi 41, 2 (2020), 145.Google Scholar
- [138] . 2019. Sparse graphical representation based discriminant analysis for heterogeneous face recognition. Signal Processing 156 (2019), 46–61.Google Scholar
Cross Ref
- [139] . 2003. Photographic authentication through untrusted terminals. IEEE Pervasive Computing 2, 1 (2003), 30–36. https://doi.org/10.1109/MPRV.2003.1186723 Google Scholar
Digital Library
- [140] . 2019. Facial action units-based image retrieval for facial expression recognition. IEEE Access 7 (2019), 5200–5207.Google Scholar
Cross Ref
- [141] . 2019. Enhancing biometric-capsule-based authentication and facial recognition via deep learning. In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. 141–146. Google Scholar
Digital Library
- [142] . 2016. Hybrid authentication.
US Patent 9,240,891. Google Scholar - [143] . 2017. Graphical password: Prevent shoulder-surfing attack using digraph substitution rules. Frontiers of Computer Science 11, 6 (2017), 1098–1108. https://doi.org/10.1007/s11704-016-5472-z Google Scholar
Digital Library
- [144] . 2011. Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism. IEEE Transactions on Dependable and Secure Computing 9, 2 (2011), 222–235. Google Scholar
Digital Library
- [145] . 2014. GRAMAP: Three stage graphical password authentication scheme. Journal of Theoretical & Applied Information Technology 61, 2 (2014), 262–269.Google Scholar
- [146] . 2017. Genetic algorithm based on support vector machines for computer vision syndrome classification. In Proceedings of the International Joint Conference
SOCO’17-CISIS’17-ICEUTE’17 . Springer, 381–390.Google Scholar - [147] . 2019. Blind deblurring of barcodes via Kullback-Leibler divergence. IEEE Transactions on Pattern Analysis and Machine Intelligence 43, 1 (2019), 77–88.Google Scholar
Digital Library
- [148] . 2019. Analysis of typing pattern in identifying soft biometric information and its impact in user recognition. In Information Technology and Applied Mathematics. Springer, 69–83.Google Scholar
Cross Ref
- [149] . 2014. Text-based active authentication for mobile devices. In IFIP International Information Security Conference. Springer, 99–112.Google Scholar
- [150] . 2020. Advanced wavelet transform for image processing—A survey. In Information, Photonics and Communication. Springer, 185–194.Google Scholar
- [151] . 2014. Survey on various techniques of user authentication and graphical password. International Journal of Computer Trends and Technology (IJCTT) 16, 3 (2014), 98–102.Google Scholar
Cross Ref
- [152] . 2018. Voice biometrics: The promising future of authentication in the internet of things. In Handbook of Research on Cloud and Fog Computing Infrastructures for Data Science. IGI Global, 360–389.Google Scholar
Cross Ref
- [153] . 2015. Advanced authentication using 3d passwords in virtual world. International Journal of Engineering and Technical Research 3, 2 (2015), 120–125.Google Scholar
- [154] . 2013. Graphical password authentication schemes: Current status and key issues. International Journal of Computer Science Issues (IJCSI) 10, 2 Part 1 (2013), 437.Google Scholar
- [155] . 2004. Graphical event-based password system.
US Patent App. 10/418,266. Google Scholar - [156] . 2019. A survey on white box cryptography model for mobile payment systems. In International Telecommunications Conference. Springer, 215–225.Google Scholar
Cross Ref
- [157] . 2018. Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. Journal of Network and Computer Applications 106 (2018), 117–123.Google Scholar
Cross Ref
- [158] . 2019. Authentication using alignment of the graphical password. In 3rd International Conference on Advanced Informatics for Computing Research (ICAICR’19). Association for Computing Machinery (ACM), a21. Google Scholar
Digital Library
- [159] . 1967. Recognition memory for words, sentences, and pictures. Journal of Verbal Learning and Verbal Behavior 6, 1 (1967), 156–163. https://doi.org/10.1016/S0022-5371(67)80067-7Google Scholar
Cross Ref
- [160] . 2019. Visual storytelling authentication.
US Patent 10,467,400. Google Scholar - [161] . 2018. Method and system for providing online authentication utilizing biometric data.
US Patent 9,911,146. Google Scholar - [162] . 2020. World Health Organization declares global emergency: A review of the 2019 novel coronavirus (COVID-19). International Journal of Surgery76 (2020), 71–76.Google Scholar
Cross Ref
- [163] . 2018. Cloud centric authentication for wearable healthcare monitoring system. IEEE Transactions on Dependable and Secure Computing 17, 5 (2018), 942–56.Google Scholar
Cross Ref
- [164] . 2004. Inkblot authentication. Microsoft Research.Google Scholar
- [165] . 2018. A shoulder surfing resistant graphical authentication system. IEEE Transactions on Dependable and Secure Computing 15, 2 (2018), 180–193.Google Scholar
Cross Ref
- [166] . 2018. A shoulder surfing resistant graphical authentication system. IEEE Transactions on Dependable and Secure Computing 15, 2 (2018), 180–193.Google Scholar
Cross Ref
- [167] . 2005. Graphical passwords: A survey. In 21st Annual Computer Security Applications Conference. IEEE, 10–pp. https://doi.org/10.1109/CSAC.2005.27 Google Scholar
Digital Library
- [168] . 2019. Improving classification accuracy using combined filter + wrapper feature selection technique. In 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT’19). IEEE, 1–6.Google Scholar
- [169] . 1998. A user identification system using signature written with mouse. In Australasian Conference on Information Security and Privacy. Springer, 403–414. https://doi.org/10.1007/BFb0053751 Google Scholar
Digital Library
- [170] . 2017. Pass-matrix authentication a solution to shoulder surfing attacks with the assistance of graphical password authentication system. In 2017 International Conference on Intelligent Computing and Control Systems (ICICCS’17). IEEE, 776–781. https://doi.org/10.1109/ICCONS.2017.8250568Google Scholar
- [171] . 2003. Awase-E: Image-based authentication for mobile phones using user’s favorite images. In International Conference on Mobile Human-Computer Interaction. Springer, 347–351.Google Scholar
- [172] . 2018. A root privilege management scheme with revocable authorization for Android devices. Journal of Network and Computer Applications 107 (2018), 69–82.Google Scholar
Cross Ref
- [173] . 2011. Token based authentication using mobile phone. In 2011 International Conference on Communication Systems and Network Technologies. IEEE, 85–88. Google Scholar
Digital Library
- [174] . 2008. Pass-go: A proposal to improve the usability of graphical passwords. IJ Network Security 7, 2 (2008), 273–292.Google Scholar
- [175] . 2013. KinWrite: Handwriting-based authentication using kinect. In NDSS, Vol. 93. 94.Google Scholar
- [176] . 2009. A survey on recognition based graphical user authentication algorithms. arXiv preprint arXiv:0912.0942 (2009).Google Scholar
- [177] . 2020. Password authentication device.
US Patent App. 16/534,409. Google Scholar - [178] . 2020. A survey on distributed machine learning. ACM Computing Surveys (CSUR) 53, 2 (2020), 1–33. Google Scholar
Digital Library
- [179] . 2019. Survey of security mechanisms in internet of things. In Recent Findings in Intelligent Computing Techniques. Springer, 353–361.Google Scholar
- [180] . 2018. SentiRelated: A cross-domain sentiment classification algorithm for short texts through sentiment related index. Journal of Network and Computer Applications 101 (2018), 111–119. Google Scholar
Digital Library
- [181] . 2018. A survey of various password authentication schemes. International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET) 4, 1 (2018), 18–22.Google Scholar
- [182] . 2020. Doodle-based authentication technique using augmented reality. IEEE Access 8 (2020), 4022–4034.Google Scholar
Cross Ref
- [183] . 2006. Cognitive authentication schemes safe against spyware. In 2006 IEEE Symposium on Security and Privacy. IEEE, 6–pp. https://doi.org/10.1109/SP.2006.10 Google Scholar
Digital Library
- [184] . 2005. Authentication using graphical passwords: Effects of tolerance and image choice. In Proceedings of the 2005 Symposium on Usable Privacy and Security. 1–12. Google Scholar
Digital Library
- [185] . 2005. PassPoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies 63, 1 (2005), 102–127. https://doi.org/10.1016/j.ijhcs.2005.04.010 Google Scholar
Digital Library
- [186] . 2006. Design and evaluation of a shoulder-surfing resistant graphical password scheme. In Proceedings of the Working Conference on Advanced Visual Interfaces. ACM, 177–184. https://doi.org/10.1145/1133265.1133303 Google Scholar
Digital Library
- [187] . 2019. Improving password memorability, while not inconveniencing the user. International Journal of Human-Computer Studies 128 (2019), 61–71.Google Scholar
Digital Library
- [188] . 2018. Keystroke dynamics enabled authentication and identification using triboelectric nanogenerator array. Materials Today 21, 3 (2018), 216–222.Google Scholar
Cross Ref
- [189] . 2008. Improvement of user authentication using schema of visual memory: Exploitation of “Schema of Story.” In 22nd International Conference on Advanced Information Networking and Applications (AINA’08). IEEE, 40–47. Google Scholar
Digital Library
- [190] . 2015. Haptic passwords. In 2015 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS’15). IEEE, 1194–1199. https://doi.org/10.1109/IROS.2015.7353521Google Scholar
- [191] . 2017. Cracking android pattern lock in five attempts. In The Network and Distributed System Security Symposium. https://doi.org/10.14722/ndss.2017.23130Google Scholar
- [192] . 2018. A video-based attack for android pattern lock. ACM Transactions on Privacy and Security (TOPS) 21, 4 (2018), 1–31. Google Scholar
Digital Library
- [193] . 2017. EvoPass: Evolvable graphical password against shoulder-surfing attacks. Computers & Security 70 (2017), 179–198. https://doi.org/10.1016/j.cose.2017.05.006Google Scholar
Cross Ref
- [194] . 2019. One-tip secure: Next-gen of text-based password. In Information and Communication Technology for Competitive Strategies. Springer, 235–243.Google Scholar
- [195] . 2006. Facial authentication system based on real-time 3D facial imaging by using correlation image sensor. In 6th International Conference on Intelligent Systems Design and Applications, Vol. 2. IEEE, 396–400. Google Scholar
Digital Library
- [196] . 2018. PEA: Parallel electrocardiogram-based authentication for smart healthcare systems. Journal of Network and Computer Applications 117 (2018), 10–16.Google Scholar
Cross Ref
- [197] . 2016. Harmonized authentication based on ThumbStroke dynamics on touch screen mobile phones. Decision Support Systems 92 (2016), 14–24. Google Scholar
Digital Library
- [198] . 2018. Patternlistener: Cracking android pattern lock using acoustic signals. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 1775–1787.Google Scholar
Digital Library
Index Terms
A Taxonomy of Multimedia-based Graphical User Authentication for Green Internet of Things
Recommendations
PassPoints: design and longitudinal evaluation of a graphical password system
Special isssue: HCI research in privacy and security is critical nowComputer security depends largely on passwords to authenticate human users. However, users have difficulty remembering passwords over time if they choose a secure password, i.e. a password that is long and random. Therefore, they tend to choose short ...
A Complete Comparison on Pure and Cued Recall-Based Graphical User Authentication Algorithms
ICCEE '09: Proceedings of the 2009 Second International Conference on Computer and Electrical Engineering - Volume 01Nowadays, user authentication is one of the important topics in information security. Strong text-based password schemes could provide with certain degree of security. However, the fact that strong passwords are difficult to memorize often leads their ...
Graphical Password: Prototype Usability Survey
ICACTE '08: Proceedings of the 2008 International Conference on Advanced Computer Theory and EngineeringAccess to computer networks and systems is most often based on the use of conventional passwords nowadays. However, users have difficulty remembering a password that is long and random-appearing. So, they create short, simple, and insecure passwords. ...






Comments