SlideShare a Scribd company logo
A Graphical Password Authentication System

                                               Ahmad Almulhem
                                        Computer Engineering Department
                                  King Fahd University of Petroleum and Minerals
                                             Dhahran, Saudi Arabia
                                            ahmadsm@kfupm.edu.sa


                         Abstract                                         In this extended abstract, we propose a graphical pass-
                                                                       word authentication system. The system combines graph-
   Graphical passwords provide a promising alternative to              ical and text-based passwords trying to achieve the best
traditional alphanumeric passwords. They are attractive                of both worlds. In section 2, we provide a brief review
since people usually remember pictures better than words.              of graphical passwords. Then, the proposed system is de-
In this extended abstract, we propose a simple graphical               scribed in section 3. In section 4, we briefly discuss imple-
password authentication system. We describe its operation              mentation and highlight some aspects about the proposed
with some examples, and highlight important aspects of the             system.
system.
                                                                       2 Graphical Passwords
                                                                           Graphical passwords refer to using pictures (also draw-
1 Introduction                                                         ings) as passwords. In theory, graphical passwords are eas-
                                                                       ier to remember, since humans remember pictures better
   User authentication is a fundamental component in most              than words [8]. Also, they should be more resistant to brute-
computer security contexts. It provides the basis for access           force attacks, since the search space is practically infinite.
control and user accountability [1]. While there are var-                  In general, graphical passwords techniques are classi-
ious types of user authentication systems, alphanumerical              fied into two main categories: recognition-based and recall-
username/passwords are the most common type of user au-                based graphical techniques [7]. In recognition-based tech-
thentication. They are versatile and easy to implement and             niques, a user is authenticated by challenging him/her to
use.                                                                   identify one or more images he or she chooses during the
   Alphanumerical passwords are required to satisfy two                registration stage. In recall-based techniques, a user is asked
contradictory requirements. They have to be easily remem-              to reproduce something that he or she created or selected
bered by a user, while they have to be hard to guess by                earlier during the registration stage.
impostor [2]. Users are known to choose easily guessable                   Passfaces is a recognition-based technique, where a user
and/or short text passwords, which are an easy target of dic-          is authenticated by challenging him/her into recognizing
tionary and brute-forced attacks [3, 4, 5]. Enforcing a strong         human faces [9]. An early recall-based graphical password
password policy sometimes leads to an opposite effect, as              approach was introduced by Greg Blonder in 1996 [10].
a user may resort to write his or her difficult-to-remember             In this approach, a user create a password by clicking on
passwords on sticky notes exposing them to direct theft.               several locations on an image. During authentication, the
   In the literature, several techniques have been proposed            user must click on those locations. PassPoints builds on
to reduce the limitations of alphanumerical password. One              Blonders idea, and overcomes some of the limitations of his
proposed solution is to use an easy to remember long                   scheme [2]. Several other approaches have been surveyed
phrases (passphrase) rather than a single word [6]. Another            in the following paper [7].
proposed solution is to use graphical passwords, in which
graphics (images) are used instead of alphanumerical pass-             3 Proposed System
words [7]. This can be achieved by asking the user to select
regions from an image rather than typing characters as in                 The proposed authentication system works as follows.
alphanumeric password approaches.                                      At the time of registration, a user creates a graphical pass-




     978-0-9564263-7/6/$25.00©2011 IEEE                          223
word by first entering a picture he or she chooses. The user
then chooses several point-of-interest (POI) regions in the
picture. Each POI is described by a circle (center and ra-
dius). For every POI, the user types a word or phrase that
would be associated with that POI. If the user does not type
any text after selecting a POI, then that POI is associated
with an empty string. The user can choose either to enforce
the order of selecting POIs (stronger password), or to make
the order insignificant.
   In Figure 1, we show an example of a user creating a
graphical password. In this example, the user chooses a
picture of his or her kids by pressing “Load Image button”.
Then the user clicks on the kids faces in the order of their
ages (order is enforced). For each selected region, the user
types the kid’s name or nickname.



                                                                                     Figure 2. Login Screen



                                                                        In the proposed system, a user freely chooses a picture,
                                                                     POIs and corresponding words. The order and number of
                                                                     POIs can be enforced for stronger authentication. Together,
                                                                     these parameters allow for a very large password space.
                                                                        We believe that proposed approach is promising and
                                                                     unique for at least two reasons:

                                                                       • It combines graphical and text-based passwords trying
                                                                         to achieve the best of both worlds.
   Figure 1. An example of creating a graphical
   password using the proposed system.                                 • It provides multi-factor authentication (graphical, text,
                                                                         POI-order, POI-number) in a friendly intuitive system.


   For authentication, the user first enters his or her user-         5 Conclusion
name. The system, then, displays the registered picture.
The user, then, has to correctly pick the POIs and type                 User authentication is a fundamental component in most
the associated words. At any time, typed words are either            computer security contexts. In this extended abstract, we
shown as asterisks (*) or hidden. In Figure 2, we show an            proposed a simple graphical password authentication sys-
example of the login screen.                                         tem. The system combines graphical and text-based pass-
                                                                     words trying to achieve the best of both worlds. It also
4 Implementation and Discussion                                      provides multi-factor authentication in a friendly intuitive
                                                                     system. We described the system operation with some ex-
   The proposed system was implemented using Visual Ba-              amples, and highlighted important aspects of the system.
sic .net 2005 (VB.net). The implementation has three main
classes:

  • LoginInfo: Contains username, graphical password,
    and related methods.                                             6 References
  • GraphicalPassword: Contains graphical password in-
    formation and related methods.                                    [1] William Stallings and Lawrie Brown. Computer Se-
                                                                          curity: Principle and Practices. Pearson Education,
  • SelReg: Contains fields about selected regions (POIs).                 2008.




     978-0-9564263-7/6/$25.00©2011 IEEE                        224
[2] Susan Wiedenbeck, Jim Waters, Jean-Camille Birget,
     Alex Brodskiy, and Nasir Memon. Passpoints: design
     and longitudinal evaluation of a graphical password
     system. International Journal of Human-Computer
     Studies, 63:102–127, July 2005.
 [3] Robert Morris and Ken Thompson. Password security:
     a case history. Communications of the ACM, 22:594–
     597, November 1979.
 [4] Daniel V. Klein. Foiling the Cracker: A Survey of, and
     Improvements to, Password Security. In Proceedings
     of the 2nd USENIX UNIX Security Workshop, 1990.
 [5] Eugene H. Spafford. Observing reusable password
     choices. In Proceedings of the 3rd Security Sympo-
     sium. Usenix, pages 299–312, 1992.
 [6] Sigmund N. Porter. A password extension for im-
     proved human factors. Computers & Security, 1(1):54
     – 56, 1982.
 [7] Xiaoyuan Suo, Ying Zhu, and G. Scott Owen. Graph-
     ical passwords: A survey. In Proceedings of Annual
     Computer Security Applications Conference, pages
     463–472, 2005.
 [8] Antonella De Angeli, Lynne Coventry, Graham John-
     son, and Karen Renaud. Is a picture really worth a
     thousand words? exploring the feasibility of graphi-
     cal authentication systems. International Journal of
     Human-Computer Studies, 63:128–152, July 2005.
 [9] Real User Corporation. The science behind passfaces,
     June 2004.
[10] G. E. Blonder. Graphical password. U.S. Patent
     5559961, Lucent Technologies, Inc. (Murray Hill,
     NJ), August 1995.




     978-0-9564263-7/6/$25.00©2011 IEEE                       225

More Related Content

PPTX
Graphical password authentication system ppts
PPT
Graphical password authentication
PPT
graphical password authentication
PPT
Graphical password
DOC
Exam system
PPTX
Graphical Password Authentication
PDF
Graphical Password Authenticationimp.docx2
DOC
Lead Allocation System's Attribute Driven Design (ADD)
Graphical password authentication system ppts
Graphical password authentication
graphical password authentication
Graphical password
Exam system
Graphical Password Authentication
Graphical Password Authenticationimp.docx2
Lead Allocation System's Attribute Driven Design (ADD)

What's hot (20)

PPTX
Web application security
PPT
Graphical password authentication
DOCX
MCSL016 IGNOU SOLVED LAB MANUAL
PPTX
Graphical password authentication
PDF
Java 8 Default Methods
PPT
Data Storage In Android
PPTX
Web Application Development using PHP and MySQL
PDF
Java Strings Tutorial | String Manipulation in Java | Java Tutorial For Begin...
PPTX
Real Time Object Tracking
PPTX
Introduction to spring boot
PDF
Android appwidget
PPTX
Object Detection using Deep Neural Networks
PPTX
ZeroMQ: Super Sockets - by J2 Labs
PPT
Social Networking Website
PPTX
Constraints of designing for mobile devices
PDF
Comparing Native Java REST API Frameworks - Seattle JUG 2022
PPT
Secure code practices
PPT
Hacking web applications
PPT
Sqlite
PDF
Angular - Chapter 2 - TypeScript Programming
Web application security
Graphical password authentication
MCSL016 IGNOU SOLVED LAB MANUAL
Graphical password authentication
Java 8 Default Methods
Data Storage In Android
Web Application Development using PHP and MySQL
Java Strings Tutorial | String Manipulation in Java | Java Tutorial For Begin...
Real Time Object Tracking
Introduction to spring boot
Android appwidget
Object Detection using Deep Neural Networks
ZeroMQ: Super Sockets - by J2 Labs
Social Networking Website
Constraints of designing for mobile devices
Comparing Native Java REST API Frameworks - Seattle JUG 2022
Secure code practices
Hacking web applications
Sqlite
Angular - Chapter 2 - TypeScript Programming
Ad

Viewers also liked (20)

PPTX
Graphical password authentication
PPTX
Ppt for graphical password authentication using cued click points
PPTX
Graphical Password Authentication
PPTX
Graphical User Authentication
PPTX
Graphical password authentication system with association of sound
PPTX
3d password by suresh
PPTX
Pptforpicturepasswordauthentication 130125073736-phpapp02
PPT
Graphical password
PDF
Authentication Scheme for Session Password using matrix Colour and Text
PDF
Volume 1 number-2pp-216-222
PDF
Graphical password based hybrid authentication system for smart hand held dev...
PDF
Graphical password authentication using pccp with sound signature
DOCX
Graphical authintication
DOCX
Ethical hacking.
PPTX
Graphical Password Authentication
PDF
Screenless displays seminar report
DOCX
Ethical hacking
DOCX
screen less display documentation
PPTX
Authentication scheme for session password using Images and color
DOC
Mind reading computer report
Graphical password authentication
Ppt for graphical password authentication using cued click points
Graphical Password Authentication
Graphical User Authentication
Graphical password authentication system with association of sound
3d password by suresh
Pptforpicturepasswordauthentication 130125073736-phpapp02
Graphical password
Authentication Scheme for Session Password using matrix Colour and Text
Volume 1 number-2pp-216-222
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password authentication using pccp with sound signature
Graphical authintication
Ethical hacking.
Graphical Password Authentication
Screenless displays seminar report
Ethical hacking
screen less display documentation
Authentication scheme for session password using Images and color
Mind reading computer report
Ad

Similar to A graphical password authentication system (ieee 2011) 1 (20)

PPTX
finale.ppt.pptx
DOCX
Vshantaram
PDF
Presentation on Graphical password-technology to make system more secured
PDF
Graphical Password Authentication
PDF
IRJET- Graphical user Authentication for an Alphanumeric OTP
PDF
Folder Security Using Graphical Password Authentication Scheme
PDF
Technical.pdf
PDF
Usenix04
PDF
Investigating the Combination of Text and Graphical Passwords for a more secu...
PDF
Ce36484489
PDF
Generic Authentication System
PDF
Ijsrdv8 i10355
PPTX
A presentation on graphical passwords
PDF
11.graphical password based hybrid authentication system for smart hand held ...
PPTX
Review 1 (1) (1).pptx
PDF
3d password - Report
PDF
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
PDF
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
PDF
idoc.pub_a-seminar-report-on-graphical-password-authentication.pdf
PDF
An Improving Method of Grid Graphical Password Authentication System
finale.ppt.pptx
Vshantaram
Presentation on Graphical password-technology to make system more secured
Graphical Password Authentication
IRJET- Graphical user Authentication for an Alphanumeric OTP
Folder Security Using Graphical Password Authentication Scheme
Technical.pdf
Usenix04
Investigating the Combination of Text and Graphical Passwords for a more secu...
Ce36484489
Generic Authentication System
Ijsrdv8 i10355
A presentation on graphical passwords
11.graphical password based hybrid authentication system for smart hand held ...
Review 1 (1) (1).pptx
3d password - Report
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
idoc.pub_a-seminar-report-on-graphical-password-authentication.pdf
An Improving Method of Grid Graphical Password Authentication System

Recently uploaded (20)

PPTX
Soccer_Basics_Presentation_about_and_info.pptx
PDF
Football World Cup Top 10 Teams Aiming for the FIFA 2026 Trophy.pdf
DOCX
NFL Dublin Addison Fuels Steelers-Vikings Showdown.docx
DOCX
NFL Dublin Minnesota’s Offensive Edge, the Josh Oliver Effect.docx
DOCX
Furniture Movers in Dubai | Best Mover In Dubai
DOCX
NFL Dublin Steelers Lesser Shows Depth and Power at Camp.docx
DOCX
NFL Madrid Dolphins Scramble for Reinforcements.docx
PPTX
Performance Analytics in the field of sports.pptx
DOCX
NFL Dublin Will Howard’s Preseason Be Over After Hand Injury.docx
DOCX
FIFA World Cup Tickets Rodrigo De Paul’s Inter Miami Move and Its FIFA 2026 I...
DOCX
Soccer World Cup Tickets Telemundo’s Big Plans for FIFA World Cup 2026.docx
DOCX
From Playgrounds to Pitches Empowering the Next Generation.docx
PPTX
Daniel Oordt | The Evolution of Dutch Fan Traditions: Why the March Still Mat...
PDF
Lionel Messi The Unparalleled Legacy of Football's Greatest Player.pdf
PPTX
BADMINTON-2ND-WEEK-FUNDAMENTAL-SKILLS.pptx
PDF
PROFESSIONAL GAME MODEL principe et sous principe 📚🧠⚽️.pdf
PPTX
Daniel Oordt | Club Colors to National Pride: The World Cup's Role in Unity
PDF
2025 AASM Schedule of Oral Presentations
PDF
FIFA Club World Cup 2025 - USA Chelsea VS PSG in Finals
PPTX
Basketball_Basics_Guide_for_kids_parents.pptx
Soccer_Basics_Presentation_about_and_info.pptx
Football World Cup Top 10 Teams Aiming for the FIFA 2026 Trophy.pdf
NFL Dublin Addison Fuels Steelers-Vikings Showdown.docx
NFL Dublin Minnesota’s Offensive Edge, the Josh Oliver Effect.docx
Furniture Movers in Dubai | Best Mover In Dubai
NFL Dublin Steelers Lesser Shows Depth and Power at Camp.docx
NFL Madrid Dolphins Scramble for Reinforcements.docx
Performance Analytics in the field of sports.pptx
NFL Dublin Will Howard’s Preseason Be Over After Hand Injury.docx
FIFA World Cup Tickets Rodrigo De Paul’s Inter Miami Move and Its FIFA 2026 I...
Soccer World Cup Tickets Telemundo’s Big Plans for FIFA World Cup 2026.docx
From Playgrounds to Pitches Empowering the Next Generation.docx
Daniel Oordt | The Evolution of Dutch Fan Traditions: Why the March Still Mat...
Lionel Messi The Unparalleled Legacy of Football's Greatest Player.pdf
BADMINTON-2ND-WEEK-FUNDAMENTAL-SKILLS.pptx
PROFESSIONAL GAME MODEL principe et sous principe 📚🧠⚽️.pdf
Daniel Oordt | Club Colors to National Pride: The World Cup's Role in Unity
2025 AASM Schedule of Oral Presentations
FIFA Club World Cup 2025 - USA Chelsea VS PSG in Finals
Basketball_Basics_Guide_for_kids_parents.pptx

A graphical password authentication system (ieee 2011) 1

  • 1. A Graphical Password Authentication System Ahmad Almulhem Computer Engineering Department King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia [email protected] Abstract In this extended abstract, we propose a graphical pass- word authentication system. The system combines graph- Graphical passwords provide a promising alternative to ical and text-based passwords trying to achieve the best traditional alphanumeric passwords. They are attractive of both worlds. In section 2, we provide a brief review since people usually remember pictures better than words. of graphical passwords. Then, the proposed system is de- In this extended abstract, we propose a simple graphical scribed in section 3. In section 4, we briefly discuss imple- password authentication system. We describe its operation mentation and highlight some aspects about the proposed with some examples, and highlight important aspects of the system. system. 2 Graphical Passwords Graphical passwords refer to using pictures (also draw- 1 Introduction ings) as passwords. In theory, graphical passwords are eas- ier to remember, since humans remember pictures better User authentication is a fundamental component in most than words [8]. Also, they should be more resistant to brute- computer security contexts. It provides the basis for access force attacks, since the search space is practically infinite. control and user accountability [1]. While there are var- In general, graphical passwords techniques are classi- ious types of user authentication systems, alphanumerical fied into two main categories: recognition-based and recall- username/passwords are the most common type of user au- based graphical techniques [7]. In recognition-based tech- thentication. They are versatile and easy to implement and niques, a user is authenticated by challenging him/her to use. identify one or more images he or she chooses during the Alphanumerical passwords are required to satisfy two registration stage. In recall-based techniques, a user is asked contradictory requirements. They have to be easily remem- to reproduce something that he or she created or selected bered by a user, while they have to be hard to guess by earlier during the registration stage. impostor [2]. Users are known to choose easily guessable Passfaces is a recognition-based technique, where a user and/or short text passwords, which are an easy target of dic- is authenticated by challenging him/her into recognizing tionary and brute-forced attacks [3, 4, 5]. Enforcing a strong human faces [9]. An early recall-based graphical password password policy sometimes leads to an opposite effect, as approach was introduced by Greg Blonder in 1996 [10]. a user may resort to write his or her difficult-to-remember In this approach, a user create a password by clicking on passwords on sticky notes exposing them to direct theft. several locations on an image. During authentication, the In the literature, several techniques have been proposed user must click on those locations. PassPoints builds on to reduce the limitations of alphanumerical password. One Blonders idea, and overcomes some of the limitations of his proposed solution is to use an easy to remember long scheme [2]. Several other approaches have been surveyed phrases (passphrase) rather than a single word [6]. Another in the following paper [7]. proposed solution is to use graphical passwords, in which graphics (images) are used instead of alphanumerical pass- 3 Proposed System words [7]. This can be achieved by asking the user to select regions from an image rather than typing characters as in The proposed authentication system works as follows. alphanumeric password approaches. At the time of registration, a user creates a graphical pass- 978-0-9564263-7/6/$25.00©2011 IEEE 223
  • 2. word by first entering a picture he or she chooses. The user then chooses several point-of-interest (POI) regions in the picture. Each POI is described by a circle (center and ra- dius). For every POI, the user types a word or phrase that would be associated with that POI. If the user does not type any text after selecting a POI, then that POI is associated with an empty string. The user can choose either to enforce the order of selecting POIs (stronger password), or to make the order insignificant. In Figure 1, we show an example of a user creating a graphical password. In this example, the user chooses a picture of his or her kids by pressing “Load Image button”. Then the user clicks on the kids faces in the order of their ages (order is enforced). For each selected region, the user types the kid’s name or nickname. Figure 2. Login Screen In the proposed system, a user freely chooses a picture, POIs and corresponding words. The order and number of POIs can be enforced for stronger authentication. Together, these parameters allow for a very large password space. We believe that proposed approach is promising and unique for at least two reasons: • It combines graphical and text-based passwords trying to achieve the best of both worlds. Figure 1. An example of creating a graphical password using the proposed system. • It provides multi-factor authentication (graphical, text, POI-order, POI-number) in a friendly intuitive system. For authentication, the user first enters his or her user- 5 Conclusion name. The system, then, displays the registered picture. The user, then, has to correctly pick the POIs and type User authentication is a fundamental component in most the associated words. At any time, typed words are either computer security contexts. In this extended abstract, we shown as asterisks (*) or hidden. In Figure 2, we show an proposed a simple graphical password authentication sys- example of the login screen. tem. The system combines graphical and text-based pass- words trying to achieve the best of both worlds. It also 4 Implementation and Discussion provides multi-factor authentication in a friendly intuitive system. We described the system operation with some ex- The proposed system was implemented using Visual Ba- amples, and highlighted important aspects of the system. sic .net 2005 (VB.net). The implementation has three main classes: • LoginInfo: Contains username, graphical password, and related methods. 6 References • GraphicalPassword: Contains graphical password in- formation and related methods. [1] William Stallings and Lawrie Brown. Computer Se- curity: Principle and Practices. Pearson Education, • SelReg: Contains fields about selected regions (POIs). 2008. 978-0-9564263-7/6/$25.00©2011 IEEE 224
  • 3. [2] Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy, and Nasir Memon. Passpoints: design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies, 63:102–127, July 2005. [3] Robert Morris and Ken Thompson. Password security: a case history. Communications of the ACM, 22:594– 597, November 1979. [4] Daniel V. Klein. Foiling the Cracker: A Survey of, and Improvements to, Password Security. In Proceedings of the 2nd USENIX UNIX Security Workshop, 1990. [5] Eugene H. Spafford. Observing reusable password choices. In Proceedings of the 3rd Security Sympo- sium. Usenix, pages 299–312, 1992. [6] Sigmund N. Porter. A password extension for im- proved human factors. Computers & Security, 1(1):54 – 56, 1982. [7] Xiaoyuan Suo, Ying Zhu, and G. Scott Owen. Graph- ical passwords: A survey. In Proceedings of Annual Computer Security Applications Conference, pages 463–472, 2005. [8] Antonella De Angeli, Lynne Coventry, Graham John- son, and Karen Renaud. Is a picture really worth a thousand words? exploring the feasibility of graphi- cal authentication systems. International Journal of Human-Computer Studies, 63:128–152, July 2005. [9] Real User Corporation. The science behind passfaces, June 2004. [10] G. E. Blonder. Graphical password. U.S. Patent 5559961, Lucent Technologies, Inc. (Murray Hill, NJ), August 1995. 978-0-9564263-7/6/$25.00©2011 IEEE 225