The Community for Technology Leaders
Computer Security Applications Conference, Annual (2005)
Tucson, Arizona
Dec. 5, 2005 to Dec. 9, 2005
ISSN: 1063-9527
ISBN: 0-7695-2461-3
pp: 463-472
Ying Zhu , Georgia State University
G. Scott. Owen , Georgia State University
Xiaoyuan Suo , Georgia State University
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend to pick passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to remember. To address this problem, some researchers have developed authentication methods that use pictures as passwords. In this paper, we conduct a comprehensive survey of the existing graphical password techniques. We classify these techniques into two categories: recognition-based and recall-based approaches. We discuss the strengths and limitations of each method and point out the future research directions in this area. We also try to answer two important questions: "Are graphical passwords as secure as text-based passwords?"; "What are the major design and implementation issues for graphical passwords?" This survey will be useful for information security researchers and practitioners who are interested in finding an alternative to text-based authentication methods.
Ying Zhu, G. Scott. Owen, Xiaoyuan Suo, "Graphical Passwords: A Survey", Computer Security Applications Conference, Annual, vol. 00, no. , pp. 463-472, 2005, doi:10.1109/CSAC.2005.27
90 ms
(Ver 3.1 (10032016))