2009 International Conference on Digital Image Processing 2009
DOI: 10.1109/icdip.2009.65
|View full text |Cite
|
Sign up to set email alerts
|

Click to Zoom-Inside Graphical Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…In PCCP, the total time is considered the time taken from the first image to the fifth image and pressing the login button. It also includes time to thinking about the password by the individuals (Kumar et al, 2009) . In SPPCCP, the time differs according to whether three or five images are selected.…”
Section: Secure Password Persuasive Cued Click Point Results For Server Programmentioning
confidence: 99%
See 1 more Smart Citation
“…In PCCP, the total time is considered the time taken from the first image to the fifth image and pressing the login button. It also includes time to thinking about the password by the individuals (Kumar et al, 2009) . In SPPCCP, the time differs according to whether three or five images are selected.…”
Section: Secure Password Persuasive Cued Click Point Results For Server Programmentioning
confidence: 99%
“…In this process, usability remains constant (Chiasson et al, 2008b). Kumar et al (2009) propose and evaluate the usability and security of Click to Zoom-inside (CTZ), a new graphical password authentication mechanism. Users have to click six times on one point in some given specific regions (pass regions) shown with dotted lines in a theme image displayed on the screen.…”
Section: Literature Reviewmentioning
confidence: 99%
“…COMPARISON GRAPHICAL PASSWORD TECHNIQUES TOWARD ATTACKS A comparison can now be made between graphical password attacks and the recognition type algorithms. The table below highlights the survey that has been done and also based on other surveys and papers [4,[16][17][18][19][20][21]. Despite our best effort to have a complete study, we will consider the missing data as part of future work.…”
Section: F Physical Attackmentioning
confidence: 95%
“…As shown below, Triangle, Movable frame and GUABRR omits mouse clicking that made shoulder surfing attacks attempts unsuccessful. However, there is still not much research done when dealing with spyware and guessing attacks [5,11,16,22]. It is also apparent that recognition algorithm that does not use proper high password space and not acknowledging the severity of physical attacks, are more prone to brute force attacks [16,23].…”
Section: F Physical Attackmentioning
confidence: 99%
“…In this paper, the reviewed graphical password schemes included are the S3PAS (Huanyu, 2007), Triangle Scheme (Sabrado, 2002), Intersection Scheme (Sabrado, 2002), Moveable Frame (Sabrado, 2002), YAGP (HaiChang, 2008), ColorLogin (HaiChang, 2009, RGGPW (Lin Phen-Lan, 2008), CTZ (Kumar V., 2009), Use Your Illusion (Eiji Hayashi, 2008), Association-based Graphical Password Scheme (Zhi Li, 2005), Blonder's Graphical Password Scheme (G. Blonder, 1996), PassPoint (S. Weidenbeck, 2005), Pass-Go (H. Tao, 2008), Passfaces (realuser.com), V-Go (Passlogix, 2007), Random Art (R. Dhamija, 2000), 3D (Alsulaiman F.A., 2006), Hasegawa et al Algorithm (Hasegawa, 2009), An Interaction and Secure User Authentication Scheme (Qibin Sun, 2008), User Authentication for Mobile Device through Image Selection Scheme (Sarwar M.I, 2008), SFR Password (http://www.sfr-software.de/cms/EN/pocketpc/sfr-password/index.html, 2009), Jansen et al Algorithm (W. Jansen, 2004), Recall-A-Story (Yves Maetx, 2009), Awase-E (Tetsuji Takada, 2008), Stroke-based Graphical Password Scheme (ZiranZheng, 2009), and DAS (Jermyn I., 1999).…”
Section: Existing Graphical Password Schemesmentioning
confidence: 99%