A Stroke-based Textual Password Authentication Scheme

被引:14
|
作者
Zheng, Ziran [1 ]
Liu, Xiyu [1 ]
Yin, Lizi [2 ]
Liu, Zhaocheng [3 ]
机构
[1] Shandong Normal Univ, Sch Management & Econ, Jinan, Peoples R China
[2] Univ Jinan, Sch Sci, Jinan, Peoples R China
[3] Jinan Railway Polytech, Dept Management, Jinan, Peoples R China
关键词
graphical password; textual password; shouder-surfing; authentication scheme;
D O I
10.1109/ETCS.2009.544
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Textual-based password authentication scheme tend to more vulnerable to attacks such as shoulder-surfing and hidden camera. To overcome the vulnerabilities of traditional methods, visual or graphical password schemes have been developed as possible alternative solutions to text-based scheme. Because simply adopting graphical password authentication also has some drawbacks, some hybrid schemes based on graphic and text were developed. In this paper, we proposed a stroke-based textual password authentication scheme. It uses shapes of strokes on the grid as the origin passwords and allows users to login with text passwords via traditional input devices. The method provides strong resistant to hidden-camera and shoulder-surfing. Moreover, the scheme has flexible enhancements to secure the authentication process. The analysis of the security of this approach is also discussed.
引用
收藏
页码:90 / +
页数:2
相关论文
共 50 条
  • [31] Cryptanalysis of an enhanced timestamp-based password authentication scheme
    Wang, B
    Li, JH
    Tong, ZP
    COMPUTERS & SECURITY, 2003, 22 (07) : 643 - 645
  • [32] Remote password authentication scheme based on cross-product
    Tan, K
    Zhu, H
    COMPUTER COMMUNICATIONS, 1999, 22 (04) : 390 - 393
  • [33] Breaking a smart card based secure password authentication scheme
    Yoon, Eun-Jun
    Yoo, Kee-Young
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 83 - +
  • [34] A remote password authentication scheme based on the digital signature method
    Hwang, MS
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1999, 70 (04) : 657 - 666
  • [35] Advanced password based authentication scheme for wireless sensor networks
    Kalra, Sheetal
    Sood, Sandeep K.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 20 : 37 - 46
  • [36] Design of Dynamic Password Authentication Scheme Based on SM Algorithm
    Xiaoqi Liang
    Yong Wang
    Xichao Yue
    2022 12TH INTERNATIONAL CONFERENCE ON POWER AND ENERGY SYSTEMS, ICPES, 2022, : 57 - 61
  • [37] A Novel Hybrid Password Authentication Scheme Based on Text and Image
    Mackie, Ian
    Yildirim, Merve
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXII, DBSEC 2018, 2018, 10980 : 182 - 197
  • [38] Security improvement on a timestamp-based password authentication scheme
    Wang, YJ
    Li, JH
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 580 - 582
  • [39] Remote scheme for password authentication based on cross-product
    Tan, Kaijun
    He, Chen
    Zhu, Hongwen
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2000, 28 (02): : 28 - 30
  • [40] Secure Pattern-Key Based Password Authentication Scheme
    Zaki, M. Hamza
    Husain, Adil
    Umar, M. Sarosh
    Khan, Muneeb H.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON MULTIMEDIA, SIGNAL PROCESSING AND COMMUNICATION TECHNOLOGIES (IMPACT), 2017, : 171 - 174