Affiliation:
1. Sabarmati University, Ahmedabad
Abstract
Security important now a days. Users of primary preference to security. Authentication process provide security to the user. Authentication process of identifying the person’s identity or conforming the identity of person. There are various authentication method, but most commonly used method is textual password. Combination of alphabet and number create a secure password. But some drawbacks i.e. it easily guess by also called attacker. If it make complex then it hard to memorize. Also various attacks brute force attack, dictionary attack, social engineering attack, evesdropping, etc. of textual password graphical password system introduced. Graphical system is easy to memorize but it undergo shoulder surfing attack which big problem. any entity or person can observe users password directly or by using any device. So as an alternative Graphical Passwords are introduced to resist the Shoulder surfing attack. the above mentioned attacks the new scheme highlights cued click point (CCP), Using graphical password as input and grid lines for image point verification. This paper survey shoulder surfing attacks in graphical password approach.
Reference12 articles.
1. Ian Jermyn, Alain Mayer, Fabia manrose, Micheal K.Reiter, Aveil D. Rubin, “The Design and analysis of graphical password” Proceeding of the 8th USENIX security symposium Washington, D.C. USA, August 1999.
2. Narman poh, samy bengio,” how do correlation and variance of base experts affect fusion in biometric authentication tasks?”, IEEE transaction on signal processing, volume 53, No 11, Nov 2005.
3. L. Sobrado “Graphical passwords,” The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research, vol. 4,2002.
4. S. Wiedenbeck and J. C. Birget, “Design and evaluation of a shoulder-surfing resistant graphical password scheme,” Proc. of Working Conf. on Advanced Visual Interfaces, May. 2006, pp. 177-184.
5. H. Gao, X. Liu and R. Dai, “Design and analysis of a graphical password scheme,” Proc. of 4th Int. Conf. on\Innovative Computing, Information and Control, Dec.2009, pp. 675-678.