Skip to main content

Hybrid Shoulder Surfing Attack Proof Approach for User Authentication

  • Conference paper
  • First Online:
Recent Trends in Communication and Intelligent Systems

Abstract

With the advancement in technology, people register themselves for many websites or applications. Therefore, secure authentication is today’s prime need. Textual passwords are the most commonly used mechanism. But with the invent of software like keyloggers, using only strong textual passwords are not enough. So graphical password comes into the picture. In this paper, we focus on building animation-based hybrid authentication approach which is secure from attacks like the Brute-force attack and Shoulder-surfing attack. HAA is designed by using colors, animation of objects, and alpha-numeric characters and is intended to provide more secure authentication session.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Bandawane Reshma B, Gangadhar Mahesh M, Kumbhar Dnyaneshwar B (2014) Data security using graphical password and AES algorithm for E-mail system. Int J Eng Dev Res

    Google Scholar 

  2. Pawade D, Lahigude A, Reja D (2015) Review report on security breaches using keylogger and clickjacking. Int J Adv Found Res Comput 2(NCRTIT2015):55–59

    Google Scholar 

  3. Gao H, Liu X, Wang S, Liu H (2009) Design and analysis of a graphical password scheme. In: IEEE Computer Society, Washington, DC

    Google Scholar 

  4. Moraskar V, Jaikalyani S, Saiyyed M, Gurnani J, Pendke K (2014) Cued click point technique for graphical password authentication. Int J Comput Sci Mobile Comput (IJCSMC)

    Google Scholar 

  5. Samleti S, Kumar C, Prakash V, Kumar N, Kumar S (2014) Shoulder surfing resistant password authentication mechanism (using convex hull click scheme). Int J Adv Res Comput Commun Eng (IJARCCE)

    Google Scholar 

  6. Aishwaryar N, Purva Suryavanshi D, Pratiksha Navarkle R (2018) Survey on graphical password authentication techniques. Int Res J Eng Technol 5(2):26–28

    Google Scholar 

  7. Renaud K (2009) On user involvement in production of images used in visual authentication. J Visual Lang Comput 20(1):1–15

    Article  MathSciNet  Google Scholar 

  8. Lin TH, Lee CC, Tsai CS, Guo SD (2010) A tabular steganography scheme for graphical password authentication. Comput Sci Inf Syst 7(4):824–841

    Article  Google Scholar 

  9. Menga W, Zhu L, Li W, Han J, Li Y (2019) Enhancing the security of FinTech applications with map-based graphical password authentication. Future Gener Comput Syst 101, Elsevier

    Google Scholar 

  10. Jim L (2012) ColorDots: an intersection analysis resistant graphical password scheme for the prevention of shoulder-surfing attack. University of North Florida

    Google Scholar 

  11. Wu TS, Lee ML, Lin HY, Wang CY (2013) Shoulder-surfing-proof graphical password authentication scheme. Springer

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Avani Sakhapara .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pawade, D., Sakhapara, A. (2021). Hybrid Shoulder Surfing Attack Proof Approach for User Authentication. In: Singh Pundir, A.K., Yadav, A., Das, S. (eds) Recent Trends in Communication and Intelligent Systems. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-16-0167-5_18

Download citation

Publish with us

Policies and ethics