Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based “Graphical password authentication using cued click points. Request PDF on ResearchGate | Graphical Password Authentication Using Cued Click Points | We propose and examine the usability and. Cued Click Points Password Authentication using Picture Grids. Article (PDF . new click-based graphical password scheme called Cued.

Author: Zulkikinos Tugar
Country: China
Language: English (Spanish)
Genre: Photos
Published (Last): 2 September 2007
Pages: 114
PDF File Size: 6.11 Mb
ePub File Size: 13.75 Mb
ISBN: 325-6-34335-452-8
Downloads: 25821
Price: Free* [*Free Regsitration Required]
Uploader: Guzuru

Mistakes occur when the participant presses the Login button but the password is incorrect. Initially when the tolerance limit was large i. Graphical passwords offer another alternative, and are the focus of this paper. Though, users have difficulty remembering a password that is long and random-appearing.

Once the first participant has logged out, the other participants are asked to enter the same password which they have observed of the first participant. Using a graphical password, users click on images rather than type alphanumeric characters.

During password creation, most of the image is dimmed except for a small view port area that is randomly positioned on the image. Text passwords are the most prevalent user authentication method, but have security and usability problems. Graphical passwords were originally defined by Blonder The main issues of knowledge-based authentication, usually text-based passwords, are well known.

During each trial, participants answered Likert-scale questions correspond to those reported in the previously cited studies A Likert scale is a psychometric scale commonly involved in research that employs questionnaires. In this paper focuses on the integrated evaluation of the Persuasive Cued Click Points graphical password authentication system, including usability and security. Effects of Tolerance and Image Choice. Remembering the order of the click-points is no longer a requirement on users, as the system presents the images one at a time.


In PassPoints, a password consists of a sequence of five click-points on a given image see Figure 1.

An authentication system which applies Persuasive Technology should guide and encourage users to select stronger passwords, but not impose system-generated passwords. One preliminary study [22] suggests that password sharing through verbal description may be possible for PassPoints.

During password confirmation and login, the images were displayed normally, without shading or the viewport and users were allowed to click anywhere. A password authentication system should encourage strong and less predictable passwords while maintaining memorability and security. Security CCSNov. Verbal Learning and Verbal Behavior, vol. The scores for those questions were reversed prior to calculating the means and medians, thus higher scores always indicate more positive results for PCCP in Table 7.

Below flowchart see Figure 5 shows the user registration procedure, this procedure include both registration phase user ID and picture selection phase. Later when the tolerance limit was reduced to 3 only three of the eight participants were able to log in and when the tolerance limit was reduced to 2 only 2 of the participants was able to log in.

The shuffle button was used moderately.


In effect, this authentication schemes makes choosing a more secure password the path-of-least-resistance. A possible strategy for increasing security is to enforce a minimum number of click-points, but allow users to choose the length of their password, similar to minimum text password lengths.

Creating a new password with different click-points results in a different image sequence. While we are not arguing that graphical passwords are the best approach to authentication, we find that they offer an pojnts environment for exploring strategies for helping users select better passwords since it is easy to compare user choices. Previous models have shown that hotspots are a problem in click-based graphical passwords, leading to a reduced effective password space that facilitates more successful dictionary attacks.


Each participant has a password which includes clicking on 5 click points in 5 different images.

Design and longitudinal evaluation of a graphical password system. We use persuasion to influence user choice is used in click-based graphical passwords, encouraging users to select more random, and hence more difficult to guess, click-points.

Graphical Password Authentication Using Cued Click Points

An authentication system must provide adequate security for its intended environment; otherwise it fails to meet its primary goal. Users were required to select a click-point within this highlighted viewport and could not click oassword of this viewport. So, the experiment shows that the security level increases with the decrease in the tolerance value, which avoid shoulder surfing problem.

This attack occurs when attackers directly obtain the passwords or parts thereof by intercepting the user entered data or by tricking users into revealing their passwords.

There was a problem providing the content you requested

The primary security problem is hotspots: Explicit indication of authentication failure is only provided after the final click-point, to protect against incremental guessing attacks.

Because it will take more time to select a click point on 5 different images, but it provides more security. According to user opinion during lab study, The PCCP graphical password authentication system will take more time to execute the xlick compare to text password and pass point.