Skip to main content

Graphical-Based Password Authentication

  • Conference paper
  • First Online:
ICT Analysis and Applications (ICT4SD 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 782))

Included in the following conference series:

  • 155 Accesses

Abstract

Traditional alphanumeric passwords have various benefits over graphic-based password authentication, including better user experience, increased memorability, and stronger security against typical password assaults. The most recent gesture-based approaches for graphical password authentication that are image-based and hybrid are all thoroughly reviewed in this paper. We have collated the security and usability traits of each method and have evaluated its advantages and disadvantages. Additionally, in order to increase security and usability, we have suggested a brand-new graphical-based password authentication system that integrates image-based and gesture-based techniques. Our experimental findings have depicted that the suggested plan is workable and efficient. Overall, this study has incremented the knowledge of graphical-based password authentication and has offered useful information to researchers and industry professionals.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Agrawal A, Stoller S (2011) Graphical passwords: a survey. J Inf Secur 2(1):31–44

    Google Scholar 

  2. Biddle R, Chiasson S, van Oorschot P (2012) Graphical passwords: learning from the first twelve years. ACM Comput Surv 44(4):19

    Article  Google Scholar 

  3. Birget J, Hong Y (2008) Passpoints: design and longitudinal evaluation of a graphical password system. Int J Hum Comput Stud 66(9):614–625

    Google Scholar 

  4. Bonneau J, Herley C, van Oorschot P (2015) The password thicket: technical and market failures in human authentication on the web. Commun ACM 58(7):74–81

    Google Scholar 

  5. Chiasson S, Biddle R, van Oorschot P (2008) A second look at the usability of click-based graphical passwords. In: Proceedings of the 2008 ACM conference on computer and communications security, pp 187–196

    Google Scholar 

  6. De Angeli A, Coventry L, Johnson G, Renaud K (2005) Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. Int J Hum Comput Stud 63(1–2):128–152

    Article  Google Scholar 

  7. Dhamija R, Perrig A (2000) Deja Vu: a user study using images for authentication. In: Proceedings of the 9th USENIX security symposium, pp 1–14

    Google Scholar 

  8. Egelman S, Peer E (2015) It’s no secret: measuring the security and reliability of authentication via “secret” questions. In: Proceedings of the 33rd annual ACM conference on human factors in computing systems, pp 1413–1422

    Google Scholar 

  9. Jan SU, Zhang Z, Asif M (2015) A survey on graphical password schemes

    Google Scholar 

  10. van Oorschot PC, Camenisch J (2012) Picture passwords: a new direction in authentication

    Google Scholar 

  11. Boukhechba M, Traynor P, Butler K (2013) PassShapes: using gestures to authenticate mobile users

    Google Scholar 

  12. Dunphy P, Briggs P, Sharif E (2012) Visual passwords: a survey of user attitudes

    Google Scholar 

  13. Uzunoglu S, Selcuk Uluagac A, Beyah R (2015) A survey on graphical passwords and their synergy with text-based passwords

    Google Scholar 

  14. Liu X, Brown MS, Qi Y (2013) Graphical password authentication: a survey

    Google Scholar 

  15. Zhang Z, Jan SU, Asif M (2015) A comparative study of graphical passwords and traditional passwords

    Google Scholar 

Download references

Acknowledgements

We thank Prof. Dr. Sandeep Shinde-Head, Department of Computer Engineering, VIT, Pune, for his valuable guidance and support to this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nikhil Patil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Patil, N., Bhutkar, G., Patil, P., Pishte, P., Popalghat, A. (2023). Graphical-Based Password Authentication. In: Fong, S., Dey, N., Joshi, A. (eds) ICT Analysis and Applications. ICT4SD 2023. Lecture Notes in Networks and Systems, vol 782. Springer, Singapore. https://doi.org/10.1007/978-981-99-6568-7_38

Download citation

Publish with us

Policies and ethics