A Stroke-based Textual Password Authentication Scheme

被引:14
|
作者
Zheng, Ziran [1 ]
Liu, Xiyu [1 ]
Yin, Lizi [2 ]
Liu, Zhaocheng [3 ]
机构
[1] Shandong Normal Univ, Sch Management & Econ, Jinan, Peoples R China
[2] Univ Jinan, Sch Sci, Jinan, Peoples R China
[3] Jinan Railway Polytech, Dept Management, Jinan, Peoples R China
关键词
graphical password; textual password; shouder-surfing; authentication scheme;
D O I
10.1109/ETCS.2009.544
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Textual-based password authentication scheme tend to more vulnerable to attacks such as shoulder-surfing and hidden camera. To overcome the vulnerabilities of traditional methods, visual or graphical password schemes have been developed as possible alternative solutions to text-based scheme. Because simply adopting graphical password authentication also has some drawbacks, some hybrid schemes based on graphic and text were developed. In this paper, we proposed a stroke-based textual password authentication scheme. It uses shapes of strokes on the grid as the origin passwords and allows users to login with text passwords via traditional input devices. The method provides strong resistant to hidden-camera and shoulder-surfing. Moreover, the scheme has flexible enhancements to secure the authentication process. The analysis of the security of this approach is also discussed.
引用
收藏
页码:90 / +
页数:2
相关论文
共 50 条
  • [1] A unified scheme for adaptive stroke-based rendering
    Kang, Hyung W.
    Chui, Charles K.
    Chakraborty, Uday K.
    VISUAL COMPUTER, 2006, 22 (9-11): : 814 - 824
  • [2] A unified scheme for adaptive stroke-based rendering
    Hyung W. Kang
    Charles K. Chui
    Uday K. Chakraborty
    The Visual Computer, 2006, 22 : 814 - 824
  • [3] Password Authentication Based on Fractal Coding Scheme
    Al-Saidi, Nadia M. G.
    Said, Mohamad Rushdan Md
    Othman, Wan Ainun M.
    JOURNAL OF APPLIED MATHEMATICS, 2012,
  • [4] A PASSWORD AUTHENTICATION SCHEME BASED ON DISCRETE LOGARITHMS
    WU, TC
    CHANG, CC
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1991, 41 (1-2) : 31 - 38
  • [5] Timestamp-based Password Authentication Scheme
    Ismail, E. S.
    Syed-Musa, S. M. S.
    PROCEEDING OF THE 25TH NATIONAL SYMPOSIUM ON MATHEMATICAL SCIENCES (SKSM25): MATHEMATICAL SCIENCES AS THE CORE OF INTELLECTUAL EXCELLENCE, 2018, 1974
  • [6] A password authentication scheme with secure password updating
    Lin, CL
    Hwang, T
    COMPUTERS & SECURITY, 2003, 22 (01) : 68 - 72
  • [7] Improvement on a Smart Card Based Password Authentication Scheme
    He, Debiao
    Chen, Jianhua
    Hu, Jin
    JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (03): : 405 - 409
  • [8] Enhancement of a timestamp-based password authentication scheme
    School of Electronics and Information Engineering, Beijing University of Aeronautics and Astronautics, Beijing 100083, China
    Beijing Hangkong Hangtian Daxue Xuebao, 2007, 5 (577-579):
  • [9] One-time password password authentication scheme based on the negative database
    Zhao, Dongdong
    Luo, Wenjian
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2017, 62 : 396 - 404
  • [10] A PASSWORD AUTHENTICATION SCHEME BASED ON DISCRETE LOGARITHMS - COMMENT
    SUN, CH
    WANG, SD
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1993, 49 (1-2) : 29 - 32