SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 296
PASSMATRIX- An Authentication System to Resist Shoulder Surfing
Attacks
Pallavi Shinde1, Prof. K. N. Shedge2
1PGStudent, Computer Engineering Department, SVIT, Nashik, India
2 Asstt. Professor, Computer Engineering Department, SVIT, Nashik, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Textual passwords are widely used in
authentication method. Strong textual passwords are hard to
memorize. To address the weakness of textual password,
graphical passwords are proposed. Click based or pattern
based approaches are widely used techniques for mobile
authentication system. Such textual and graphical passwords
scheme suffers from shoulder surfing attacks. Attacker can
directly observe or can use video recorder or webcam to
collect password credentials. This work aims to study existing
authentication systems its advantages, limitations and
drawbacks. After analysis a concrete authentication system
structure is proposed that overcome the disadvantages of
existing system.
Key Words: Shoulder surfing attack, Authentication
system, Graphical Passwords
1. INTRODUCTION
Most of the authentication system uses text based
passwords. For higher security against brute force attack
strong password is generated using combination of upper
case and lowercase characters, numerical values andspecial
characters. Strong passwords are randomly generated and
not have specific meaning. Such passwords are hard to
memorize and recollect. Due to this reason user tried to set
easy passwords having some dictionary meaning. Asper the
article [2] in computer world, 80% user set such easy
password and those can be cracked by hackers within 30
seconds.
Based on the Psychological study [3] user is able to
memorize images with long terms memory rather than
textual words. To overcome the problems of text based
passwords, image based passwords techniques are
proposed. User can be able to set complex image based
password and can be recollect it after long time. But most of
the image based password authentication systems are
vulnerable to shoulder surfing attack. In shoulder surfing
attack, attacker can directly get the information by standing
next to the user or indirectly using video recorder or web
cam.
Most of the handheld devices uses pattern based
password. These patterns based authentication system is
vulnerable to shoulder surfing attack as well as the Smudge
Attacks. The attacker can easily get the password pattern by
observing the smudge left on the touch screen.
Defining bad and easily crack able passwordand/or
loginusing password in insecure environmentmainlycauses
loopholes in password authentication security. There is a
need of secured password authentication system which
overcomes the drawbacks of existing text and image based
password schemes.
To overcome these problems, biometricalpassword
schemes are introduced. In biometric password
authentication system user voice, retina, thumbprint, face
are used as a passwords. There are various types of
biometric sensors which as able to authenticate user. Such
schemes are secured but hardware specific. Special sensor
devices are required for authentication. It is impractical to
have such authentication system to regular web based
resources and such system installation and maintenance is
costly.
1.1 LITERATURE SURVEY
To provide more secured authentication system
external hardware can be used such as:multi-touchmonitor,
voice recorder, some sensors like vibration sensor,
gyroscope sensor, etc.[4][5][6] Thesesystemsprovidebetter
security than other password authentication system but
such system are not affordable to every user. External
hardware is required for every authentication and may not
be applicable to web based systems. This work mainly
focuses on graphical password authentication systems.
Draw-a-Secret (DAS) technique is proposed by
Jermyn et al.[7] in 1999. In early days the handheld devices
was not graphically strong. The color and pixel quality was
weak. DAS system is implemented by considering these
limitations. In this scheme, user need to draw thepredefined
secret password on 2D graphical screen. Forthisscheme,the
whole screen is divided in number of grids. User need to
follow the greed selection sequence while drawing the
password image.
1.2 ANALYSIS AND PROBLEM FORMULATION
In day to day life user usesmobile and web based systemsto
accesstheir personal email accounts, online money transfer,
upload and download personal data on cloud. Due to the
internet availability, user accessessuchsystemsanytimeand
anywhere. The use of such personal service access in public
locations may cause security issues. Users personal
password may be leaked unconsciously to the unknown
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 297
user. People with malicious intent can make misuse of such
information.
There is need to provide better security to access such
personal services in public environment.
Following are the research problems that need to be
addressed:
1) Alleviate the shoulder surfing attack in authentication
process in public environment.
2) How to increase password space than existingPINsystem
3) How to provide an ease to find desired pass object from
set of objects
4) How to make password easy to memory and require less
computation during authentication.
5) How to make the system available for all kind of devices
and affordable to every user.
2. SYSTEM OVERVIEW
A novel authentication system PassMatrix, based on
graphical passwords to resist shoulder surfing attacks is
proposed. The proposed system provides a new graphical
password authentication system. This is android based
system. Multiple images are used to define password. . For
every login session, user needs to scroll circulative
horizontal and vertical bars. A password hint is provided to
the user to select desired image password grid. For
password selection, password hint to set covering the entire
scope of pass-images. Using a one-time login indicator per
image, users can point out the location of their pass-square
without directly clicking or touching it, which is an action
vulnerable to shoulder surfing attacks.
To provide more secured authentication system, The base
paper is extended with the following 2 techniques.
1) If incorrect password grid is selected then for higher
security system can display incorrect image for next pass
selection.
2) System can Change pass image for every login using:
rotation and flipping.
Following fig. 1 shows the system architecture.
Fig. 1. System Architecture
A. Algorithms
PASSMatrix-Authentication
In registration phase, the user creates an account which
containsa username and a password. The passwordconsists
of only one pass-square per image for a sequence of n
images. It is assume that user will register to the system in
secure environment. For log into the passMatrix the user
uses his/her username, password and login indicators.
System selects user passimagesbased ontheloginnameand
provide a panel to select a password using horizontal and
vertical scroll bars. Based on predefined password and
generated hint, user can generate a net password for every
login session.
Algorithm Steps:
Input: Registration details
Username
Output: Authentication result
Processing:
1) Get pass images by matching the user name
2) Generate a random alphabet/ number as an hint and
Provide to the user using audio message.
3) For every login pass image
4) Discretize image in 6 *6 blocks. Rotate and flip image
5) Generate horizontal and vertical scroll bars
6) Accept user input
7) Check if user input matches to the registration details
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 298
8) Display next image and fllow steps from 4
9) Else disply incorrect input image to the user as a warning
10) If all clicks matches notify user with success message
11) If login attempts >3 then lock the system for next 5 min
3. IMPLEMENTATION
A. Experimental Setup:
A client server architecture is developed. For client end an
android application is developed using android studio. The
application is developed for android sdk version 5.1 and
above. At the server end php application is developed to
define web services. To store database mysql database is
used.
B. Dataset:
For creating pass matrix grid images are required. Images
are downloaded from flikr dataset. Random images from
these dataset are selected to define password of a system.
C. Performance Metric:
For testing 30 different users (15 male, 15 female) are
selected. These users test this system for 15 times. First 5
attempts are treated as practice sessions and next 10
sessions are treated as login attempts. The accuracy and
usability is calculated using practice sessions and login
attempts.
1) Accuracy:
1. Based on the practice sessions, accuracy of the system is
calculated as:
Practice_acc=successfulpracticeattempts/
totalpracticeattempts
2. Based on the login sessions, accuracy of the system is
calculated as:
Login acc = successfulloginattempts/ totalloginattempts
2) Usability:
The usability of system measures the users experience.
It includes the total time required for registration and login
phase for 3 pass images and 5 pass images.
4. CONCLUSIONS
The proposed system provide an authentication system
for android devices. This system can resist shoulder surfing
attack. This is click based password system. This technique
contains pass-matrix. More than one image are used to set
the password. This system follows the technique of session
password. A password added in one login session can not be
applicable for other sessions. In future, the system can be
implemented for desktop application as well as Automated
Teller Machine (ATM).
ACKNOWLEDGEMENT
First of all my special thanks to head of Department of
Computer Engineering, SVIT, Chincholi, Nashik Prof. Prof. K.
N. Shedge, principal Dr. S. N. Shelke for their kind support
and suggestions. It would not have been possiblewithoutthe
kind support. We would like to extend our sincere thanks to
all the faculty members the department of Computer
Engineering for their help. We are also thankfultocolleagues
for moral support and encouragement. At the end, We are
very much thankful to all for direct and indirect help.
REFERENCES
1. Hung-Min Sun, Shiuan-Tung Chen, Jyh-HawYehand
Chia-Yun Cheng,"A Shoulder Surfing Resistant
Graphical Authentication System",IEEE
Transactions on DependableandSecureComputing,
Vol.1 PP. 1, Issue: 99, March 2016
2. K. Gilhooly, “Biometrics: Getting back to business,”
Computerworld, May, vol. 9, 2005.
3. D. Nelson, U. Reed, and J. Walling, “Picture
superiority effect,” Journal of Experimental
Psychology: Human Learning and Memory, vol. 3,
pp. 485–497, 1977.
4. Bianchi, I. Oakley, V. Kostakos, and D. S. Kwon, “The
phone lock: Audio and haptic shoulder-surfing
resistant pin entry methods for mobile devices,” in
Proceedings of the Fifth International Conference
on Tangible, Embedded, and Embodied Interaction,
ser. TEI ’11. New York, NY, USA: ACM, 2011, pp.
197–200.
5. Bianchi, I. Oakley, and D. S. Kwon, “The secure
haptic keypad: A tactile password system,” in
Proceedings of the SIGCHI Conference on Human
Factors in Computing Systems, ser. CHI ’10. New
York, NY, USA: ACM, 2010, pp. 1089–1092.
6. Oakley and A. Bianchi, “Multi-touch passwords for
mobile device access,” in Proceedings of the 2012
ACM Conference on Ubiquitous Computing, ser.
UbiComp ’12. New York, NY, USA: ACM, 2012, pp.
611–612.
7. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A.
Rubin, “The design and analysis of graphical
passwords,” in Proceedings of the 8th conference
on USENIX Security Symposium-Volume 8. USENIX
Association, 1999, pp. 1–1.
8. S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and
N. Memon, “Passpoints: Design and longitudinal
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 299
evaluation of a graphical password system,”
International Journal of Human-Computer Studies,
vol. 63, no. 1-2, pp. 102–127, 2005.
9. M. Martinez-Diaz, J. Fierrez, and J. Galbally,
“Graphical passwordbased userauthenticationwith
free-form doodles,” IEEE Transactions on Human-
Machine Systems, vol. PP, no. 99, pp. 1–8, 2015.
10. V. Roth, K. Richter, and R. Freidinger, “A pin-entry
method resilient against shoulder surfing,” in
Proceedings of the 11th ACM conference on
Computer and communications security, ser. CCS
’04. New York, NY, USA: ACM, 2004, pp. 236–245.
11. T. Takada, “fakepointer: An authentication scheme
for improving security againstpeepingattacksusing
video cameras,” in Mobile Ubiquitous Computing,
Systems, Services and Technologies, 2008.
UBICOMM’ 08. The Second InternationalConference
on. IEEE, 2008, pp. 395–400.,
12. S. Wiedenbeck, J. Waters, L. Sobrado,andJ.-C.Birget,
“Design and evaluation of a shoulder-surfing
resistant graphical password scheme,” in
Proceedings of the working conference on
Advanced visual interfaces, ser. AVI ’06. New York,
NY, USA: ACM, 2006, pp. 177–184.
13. S. Chiasson, P. van Oorschot, and R. Biddle,
“Graphical password authenticationusingcuedclick
points,” Computer Security–ESORICS2007,pp.359–
374, 2007.
14. L. Wang, X. Chang, Z. Ren, H. Gao, X. Liu, and U.
Aickelin, “Against spyware using captcha in
graphical password scheme,” in 2010 24th IEEE
International Conference on Advanced Information
Networking and Applications. IEEE, 2010, pp. 760–
767.
15. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. Smith,
“Smudge attacks on smartphone touch screens,” in
USENIX 4th Workshop on Offensive Technologies,
2010.

Weitere Àhnliche Inhalte

Was ist angesagt?

[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
IJCST - ESRG Journals
 

Was ist angesagt? (20)

[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
 
IRJET- Deceptive Visual Impression to Prevent Shoulder Surfer Attack
IRJET- Deceptive Visual Impression to Prevent Shoulder Surfer AttackIRJET- Deceptive Visual Impression to Prevent Shoulder Surfer Attack
IRJET- Deceptive Visual Impression to Prevent Shoulder Surfer Attack
 
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemSmart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
 
C6524029320
C6524029320C6524029320
C6524029320
 
IRJET - Face Detection and Recognition System
IRJET -  	  Face Detection and Recognition SystemIRJET -  	  Face Detection and Recognition System
IRJET - Face Detection and Recognition System
 
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
IRJET -  	  Contactless Biometric Security System using Finger Knuckle PatternsIRJET -  	  Contactless Biometric Security System using Finger Knuckle Patterns
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
 
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
 
Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
 
Image authentication for secure login
Image authentication for secure loginImage authentication for secure login
Image authentication for secure login
 
Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
 
IRJET - pyScout: Employee Monitoring System by using Screen Capturing Tec...
IRJET -  	  pyScout: Employee Monitoring System by using Screen Capturing Tec...IRJET -  	  pyScout: Employee Monitoring System by using Screen Capturing Tec...
IRJET - pyScout: Employee Monitoring System by using Screen Capturing Tec...
 
IRJET- Device Authentication Wireless Netework for Secured Communication
IRJET- Device Authentication Wireless Netework for Secured CommunicationIRJET- Device Authentication Wireless Netework for Secured Communication
IRJET- Device Authentication Wireless Netework for Secured Communication
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
 
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMA WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
 
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure VanetIRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
 
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
 

Ähnlich wie IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks

Ähnlich wie IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks (20)

IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC AlgorithmIRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image Segmentation
 
IRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document SharingIRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document Sharing
 
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System             IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based Authentication
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based Authentication
 
IRJET-Design and Implementation of Efficient Adder using Various Logic Styles
IRJET-Design and Implementation of Efficient Adder using Various Logic StylesIRJET-Design and Implementation of Efficient Adder using Various Logic Styles
IRJET-Design and Implementation of Efficient Adder using Various Logic Styles
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET-  	  Web Application for Secured Two Factor AuthenticationIRJET-  	  Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 
IRJET- VISITX: Face Recognition Visitor Management System
IRJET-  	  VISITX: Face Recognition Visitor Management SystemIRJET-  	  VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management System
 
IRJET- Keystroke Dynamics for user Authentication
IRJET-  	  Keystroke Dynamics for user AuthenticationIRJET-  	  Keystroke Dynamics for user Authentication
IRJET- Keystroke Dynamics for user Authentication
 
Break Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation BlastBreak Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation Blast
 
Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCV
 

Mehr von IRJET Journal

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

KĂŒrzlich hochgeladen

Call Now ≜ 9953056974 â‰ŒđŸ” Call Girls In New Ashok Nagar â‰ŒđŸ” Delhi door step de...
Call Now ≜ 9953056974 â‰ŒđŸ” Call Girls In New Ashok Nagar  â‰ŒđŸ” Delhi door step de...Call Now ≜ 9953056974 â‰ŒđŸ” Call Girls In New Ashok Nagar  â‰ŒđŸ” Delhi door step de...
Call Now ≜ 9953056974 â‰ŒđŸ” Call Girls In New Ashok Nagar â‰ŒđŸ” Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
sivaprakash250
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 

KĂŒrzlich hochgeladen (20)

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call Now ≜ 9953056974 â‰ŒđŸ” Call Girls In New Ashok Nagar â‰ŒđŸ” Delhi door step de...
Call Now ≜ 9953056974 â‰ŒđŸ” Call Girls In New Ashok Nagar  â‰ŒđŸ” Delhi door step de...Call Now ≜ 9953056974 â‰ŒđŸ” Call Girls In New Ashok Nagar  â‰ŒđŸ” Delhi door step de...
Call Now ≜ 9953056974 â‰ŒđŸ” Call Girls In New Ashok Nagar â‰ŒđŸ” Delhi door step de...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 

IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 296 PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks Pallavi Shinde1, Prof. K. N. Shedge2 1PGStudent, Computer Engineering Department, SVIT, Nashik, India 2 Asstt. Professor, Computer Engineering Department, SVIT, Nashik, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Textual passwords are widely used in authentication method. Strong textual passwords are hard to memorize. To address the weakness of textual password, graphical passwords are proposed. Click based or pattern based approaches are widely used techniques for mobile authentication system. Such textual and graphical passwords scheme suffers from shoulder surfing attacks. Attacker can directly observe or can use video recorder or webcam to collect password credentials. This work aims to study existing authentication systems its advantages, limitations and drawbacks. After analysis a concrete authentication system structure is proposed that overcome the disadvantages of existing system. Key Words: Shoulder surfing attack, Authentication system, Graphical Passwords 1. INTRODUCTION Most of the authentication system uses text based passwords. For higher security against brute force attack strong password is generated using combination of upper case and lowercase characters, numerical values andspecial characters. Strong passwords are randomly generated and not have specific meaning. Such passwords are hard to memorize and recollect. Due to this reason user tried to set easy passwords having some dictionary meaning. Asper the article [2] in computer world, 80% user set such easy password and those can be cracked by hackers within 30 seconds. Based on the Psychological study [3] user is able to memorize images with long terms memory rather than textual words. To overcome the problems of text based passwords, image based passwords techniques are proposed. User can be able to set complex image based password and can be recollect it after long time. But most of the image based password authentication systems are vulnerable to shoulder surfing attack. In shoulder surfing attack, attacker can directly get the information by standing next to the user or indirectly using video recorder or web cam. Most of the handheld devices uses pattern based password. These patterns based authentication system is vulnerable to shoulder surfing attack as well as the Smudge Attacks. The attacker can easily get the password pattern by observing the smudge left on the touch screen. Defining bad and easily crack able passwordand/or loginusing password in insecure environmentmainlycauses loopholes in password authentication security. There is a need of secured password authentication system which overcomes the drawbacks of existing text and image based password schemes. To overcome these problems, biometricalpassword schemes are introduced. In biometric password authentication system user voice, retina, thumbprint, face are used as a passwords. There are various types of biometric sensors which as able to authenticate user. Such schemes are secured but hardware specific. Special sensor devices are required for authentication. It is impractical to have such authentication system to regular web based resources and such system installation and maintenance is costly. 1.1 LITERATURE SURVEY To provide more secured authentication system external hardware can be used such as:multi-touchmonitor, voice recorder, some sensors like vibration sensor, gyroscope sensor, etc.[4][5][6] Thesesystemsprovidebetter security than other password authentication system but such system are not affordable to every user. External hardware is required for every authentication and may not be applicable to web based systems. This work mainly focuses on graphical password authentication systems. Draw-a-Secret (DAS) technique is proposed by Jermyn et al.[7] in 1999. In early days the handheld devices was not graphically strong. The color and pixel quality was weak. DAS system is implemented by considering these limitations. In this scheme, user need to draw thepredefined secret password on 2D graphical screen. Forthisscheme,the whole screen is divided in number of grids. User need to follow the greed selection sequence while drawing the password image. 1.2 ANALYSIS AND PROBLEM FORMULATION In day to day life user usesmobile and web based systemsto accesstheir personal email accounts, online money transfer, upload and download personal data on cloud. Due to the internet availability, user accessessuchsystemsanytimeand anywhere. The use of such personal service access in public locations may cause security issues. Users personal password may be leaked unconsciously to the unknown
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 297 user. People with malicious intent can make misuse of such information. There is need to provide better security to access such personal services in public environment. Following are the research problems that need to be addressed: 1) Alleviate the shoulder surfing attack in authentication process in public environment. 2) How to increase password space than existingPINsystem 3) How to provide an ease to find desired pass object from set of objects 4) How to make password easy to memory and require less computation during authentication. 5) How to make the system available for all kind of devices and affordable to every user. 2. SYSTEM OVERVIEW A novel authentication system PassMatrix, based on graphical passwords to resist shoulder surfing attacks is proposed. The proposed system provides a new graphical password authentication system. This is android based system. Multiple images are used to define password. . For every login session, user needs to scroll circulative horizontal and vertical bars. A password hint is provided to the user to select desired image password grid. For password selection, password hint to set covering the entire scope of pass-images. Using a one-time login indicator per image, users can point out the location of their pass-square without directly clicking or touching it, which is an action vulnerable to shoulder surfing attacks. To provide more secured authentication system, The base paper is extended with the following 2 techniques. 1) If incorrect password grid is selected then for higher security system can display incorrect image for next pass selection. 2) System can Change pass image for every login using: rotation and flipping. Following fig. 1 shows the system architecture. Fig. 1. System Architecture A. Algorithms PASSMatrix-Authentication In registration phase, the user creates an account which containsa username and a password. The passwordconsists of only one pass-square per image for a sequence of n images. It is assume that user will register to the system in secure environment. For log into the passMatrix the user uses his/her username, password and login indicators. System selects user passimagesbased ontheloginnameand provide a panel to select a password using horizontal and vertical scroll bars. Based on predefined password and generated hint, user can generate a net password for every login session. Algorithm Steps: Input: Registration details Username Output: Authentication result Processing: 1) Get pass images by matching the user name 2) Generate a random alphabet/ number as an hint and Provide to the user using audio message. 3) For every login pass image 4) Discretize image in 6 *6 blocks. Rotate and flip image 5) Generate horizontal and vertical scroll bars 6) Accept user input 7) Check if user input matches to the registration details
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 298 8) Display next image and fllow steps from 4 9) Else disply incorrect input image to the user as a warning 10) If all clicks matches notify user with success message 11) If login attempts >3 then lock the system for next 5 min 3. IMPLEMENTATION A. Experimental Setup: A client server architecture is developed. For client end an android application is developed using android studio. The application is developed for android sdk version 5.1 and above. At the server end php application is developed to define web services. To store database mysql database is used. B. Dataset: For creating pass matrix grid images are required. Images are downloaded from flikr dataset. Random images from these dataset are selected to define password of a system. C. Performance Metric: For testing 30 different users (15 male, 15 female) are selected. These users test this system for 15 times. First 5 attempts are treated as practice sessions and next 10 sessions are treated as login attempts. The accuracy and usability is calculated using practice sessions and login attempts. 1) Accuracy: 1. Based on the practice sessions, accuracy of the system is calculated as: Practice_acc=successfulpracticeattempts/ totalpracticeattempts 2. Based on the login sessions, accuracy of the system is calculated as: Login acc = successfulloginattempts/ totalloginattempts 2) Usability: The usability of system measures the users experience. It includes the total time required for registration and login phase for 3 pass images and 5 pass images. 4. CONCLUSIONS The proposed system provide an authentication system for android devices. This system can resist shoulder surfing attack. This is click based password system. This technique contains pass-matrix. More than one image are used to set the password. This system follows the technique of session password. A password added in one login session can not be applicable for other sessions. In future, the system can be implemented for desktop application as well as Automated Teller Machine (ATM). ACKNOWLEDGEMENT First of all my special thanks to head of Department of Computer Engineering, SVIT, Chincholi, Nashik Prof. Prof. K. N. Shedge, principal Dr. S. N. Shelke for their kind support and suggestions. It would not have been possiblewithoutthe kind support. We would like to extend our sincere thanks to all the faculty members the department of Computer Engineering for their help. We are also thankfultocolleagues for moral support and encouragement. At the end, We are very much thankful to all for direct and indirect help. REFERENCES 1. Hung-Min Sun, Shiuan-Tung Chen, Jyh-HawYehand Chia-Yun Cheng,"A Shoulder Surfing Resistant Graphical Authentication System",IEEE Transactions on DependableandSecureComputing, Vol.1 PP. 1, Issue: 99, March 2016 2. K. Gilhooly, “Biometrics: Getting back to business,” Computerworld, May, vol. 9, 2005. 3. D. Nelson, U. Reed, and J. Walling, “Picture superiority effect,” Journal of Experimental Psychology: Human Learning and Memory, vol. 3, pp. 485–497, 1977. 4. Bianchi, I. Oakley, V. Kostakos, and D. S. Kwon, “The phone lock: Audio and haptic shoulder-surfing resistant pin entry methods for mobile devices,” in Proceedings of the Fifth International Conference on Tangible, Embedded, and Embodied Interaction, ser. TEI ’11. New York, NY, USA: ACM, 2011, pp. 197–200. 5. Bianchi, I. Oakley, and D. S. Kwon, “The secure haptic keypad: A tactile password system,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ser. CHI ’10. New York, NY, USA: ACM, 2010, pp. 1089–1092. 6. Oakley and A. Bianchi, “Multi-touch passwords for mobile device access,” in Proceedings of the 2012 ACM Conference on Ubiquitous Computing, ser. UbiComp ’12. New York, NY, USA: ACM, 2012, pp. 611–612. 7. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, “The design and analysis of graphical passwords,” in Proceedings of the 8th conference on USENIX Security Symposium-Volume 8. USENIX Association, 1999, pp. 1–1. 8. S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, “Passpoints: Design and longitudinal
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 299 evaluation of a graphical password system,” International Journal of Human-Computer Studies, vol. 63, no. 1-2, pp. 102–127, 2005. 9. M. Martinez-Diaz, J. Fierrez, and J. Galbally, “Graphical passwordbased userauthenticationwith free-form doodles,” IEEE Transactions on Human- Machine Systems, vol. PP, no. 99, pp. 1–8, 2015. 10. V. Roth, K. Richter, and R. Freidinger, “A pin-entry method resilient against shoulder surfing,” in Proceedings of the 11th ACM conference on Computer and communications security, ser. CCS ’04. New York, NY, USA: ACM, 2004, pp. 236–245. 11. T. Takada, “fakepointer: An authentication scheme for improving security againstpeepingattacksusing video cameras,” in Mobile Ubiquitous Computing, Systems, Services and Technologies, 2008. UBICOMM’ 08. The Second InternationalConference on. IEEE, 2008, pp. 395–400., 12. S. Wiedenbeck, J. Waters, L. Sobrado,andJ.-C.Birget, “Design and evaluation of a shoulder-surfing resistant graphical password scheme,” in Proceedings of the working conference on Advanced visual interfaces, ser. AVI ’06. New York, NY, USA: ACM, 2006, pp. 177–184. 13. S. Chiasson, P. van Oorschot, and R. Biddle, “Graphical password authenticationusingcuedclick points,” Computer Security–ESORICS2007,pp.359– 374, 2007. 14. L. Wang, X. Chang, Z. Ren, H. Gao, X. Liu, and U. Aickelin, “Against spyware using captcha in graphical password scheme,” in 2010 24th IEEE International Conference on Advanced Information Networking and Applications. IEEE, 2010, pp. 760– 767. 15. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. Smith, “Smudge attacks on smartphone touch screens,” in USENIX 4th Workshop on Offensive Technologies, 2010.