Shoulder surfing is biggest problem faced by
security system nowadays. The attacker observes the user
while entering the password and forges the password. This
is called as Shoulder surfing. In this paper we have
surveyed the existing solutions and problems dealing with
shoulder surfing. We have made analysis of various
schemes and have found their pros and cons. Most of the
systems are not either secure or efficient. We have
proposed one secure and efficient scheme .We have made
analysis of its performance against accidental login and
password space i.e. usability.
Published In : IJCAT Journal Volume 2, Issue 9
Date of Publication : September 2015
Pages : 367 - 371
Figures :03
Tables : --
Publication Link :Graphical Password System Based on Text
against Shoulder Surfing
Atul Mothabhau Nikam : received
Bacheolar’s degree in Computer
Engineering from university of
pune, 2012. Currently Pursuing
Master’s in Computer Engineering
from Sinhgad Academy Of
Engineering, Pune University,
Maharashtra, India, 2015.
Santosh N. Shelke : received Master’s degree in Computer
Engineering , he is a working as a Senior Assistant Professor ,
Sinhgad Academy Of Engineering, Pune University,
Maharashtra, India.
Shoulder Surfing
Accidental Login
Graphical Password
Cyber Security
We successfully presented the survey of problem of
shoulder surfing and password protection systems
previously suggested. We found advantages and
disadvantages of the surveyed methods. Then we
suggested an improvised text based graphical password
protection system against shoulder surfing. We analyzed
the system for password space, probability of accidental
login , resistance to shoulder surfing and discussed the
results.
[1] L. Sobrado and J. C. Birget, “Graphical passwords,”
The Rutgers Scholar, An Electronic Bulletin for
Undergraduate Research, vol. 4, 2002.
[2] S. Wiedenbeck , J.Waters, L. Sobrado, and J. C.
Birget, “Design and evaluation of a shoulder-surfing
resistant graphical password scheme,” 2006.
[3] H. Gao, X. Liu, S. Wang, H. Liu, and R. Dai,
“Design and analysis of a graphical, Information and
Control, Dec. 2009. [4]T. Yamamoto, Y. Kojima,
and M. Nishigaki, “A shouldersurfing- resistant
image-based authentication system with temporal
indirect image selection,” Proc. of the 2009 Int.
Conf. on Security and Management, July 2009.
[5] H. Zhao and X. Li, “S3PAS: A scalable shouldersurfing
resistant textual-graphical password
authentication scheme,” Proc. of 21st Int. Conf. on
Advanced Information Networking and Applications
Workshops, vol. 2, May 2007.
[6] M. Sreelatha, M. Shashi, M. Anirudh, Md. Sultan
Ahamer, and V. Manoj Kumar. “Authentication
schemes for session passwords using color and
images,” International Journal of Network Security
& Its Applications, vol. 3, no. 3, May 2011.
[7] S. H. Kim, J. W. Kim, S. Y. Kim, and H.G. Cho. “A
new shoulder-surfing resistant password for mobile
environments,” Proc. of 5th Int. Conf. on Ubiquitous
Information Management and Communication, Feb.
2011.
[8] M. K. Rao and S. Yalamanchili. “Novel shouldersurfing
resistant authentication schemes using textgraphical
passwords,” International Journal of
Information & Network Security, vol. 1, no. 3, pp.
163-170, Aug. 2012.
[10] “Shoulder Surfing attack in graphical password
Authentication” (IJCSIS) International Journal of
Computer Science and Information Security, Vol. 6,
No. 2, 2009
[11] “Shoulder-Surfing Safe Login in a Partially
Observable Attacker Model (Short Paper)” FESB,
University of Split 2 Polytechnic Institute of New
York University.