Abstract
User authentication is one of the most important topics in information security. A text-based strong password scheme can provide a certain degree of security. However, as strong passwords are difficult to memorize, users often write them down on a piece of paper or even save them in a computer file. An image-based authentication scheme has been proposed as a possible alternative solution to text-based authentication, motivated particularly by the fact that humans can remember images better than text. Recently, many networks, computer systems and electronic-commerce environments have tried using a graphical technique for user authentication. All graphical and image algorithms comprise two different aspects: usability and security. Unfortunately, none of the graphical algorithms are able to cover both these aspects at the same time. In this paper, we evaluate the usability and security of different authentication schemes and compare them with our proposed scheme, which is the Implicit Password Authentication System (IPAS) by an experiment and a questionnaire survey.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Almuairfi S, Veeraraghavan P, Chilamkurti N (2011) IPAS: implicit password authentication system. In: Advanced information networking and applications (WAINA), 2011 IEEE workshops of international conference on advanced information networking and applications
Almuairfi S, Veeraraghavan P, Chilamkurti N (2013) A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices. Math Comput Model 58(1–2):108–116. ISSN 0895-7177, 10.1016/j.mcm.2012.07.005
Xiaoyuan S, Ying Z et al (2005) Graphical passwords: a survey. In: 21st annual computer security applications conference, pp 463–472
Wells J, Hutchinson D, Pierce J (2008) Enhanced security for preventing man-in-the-middle attacks in authentication, data entry and transaction verification. In: Australian information security management conference. Paper 58
Xiaoyuan S, Ying Z et al (2005) Graphical passwords: a survey. In: Computer security applications conference, 21st annual
Pierce JD, Wells JG, Warren MJ, Mackay DR (2003) A conceptual model for graphical authentication. In: 1st Australian information security management conference, 24 Sept. Perth, Western Australia, paper 16
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Almuairfi, S., Veeraraghavan, P., Chilamkurti, N. (2014). IPAS: User Test Phase and Evaluation. In: Park, J., Zomaya, A., Jeong, HY., Obaidat, M. (eds) Frontier and Innovation in Future Computing and Communications. Lecture Notes in Electrical Engineering, vol 301. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-8798-7_2
Download citation
DOI: https://doi.org/10.1007/978-94-017-8798-7_2
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-017-8797-0
Online ISBN: 978-94-017-8798-7
eBook Packages: EngineeringEngineering (R0)