Shoulder Surfing Resistant Graphical Authentication Scheme for Web Based Applications

Article ID

CSTSDE72M63

Shoulder Surfing Resistant Graphical Authentication Scheme for Web Based Applications

Seun Ebiesuwa
Seun Ebiesuwa Babcock University
Ariweriokuma
Ariweriokuma
P.E.
P.E.
Akinsanya
Akinsanya
Adebola
Adebola
DOI

Abstract

Since the design and development of the first graphical authentication pioneered by Blonder in 1996, numerous research has been conducted on this area to be used in different scenarios especially on the Internet. One of the major motivators is the picture superiority which as studies have shown, states that images/pictures provide higher memorability as opposed to Text based authentication. However, graphical authentication is still faced with some challenges. In this paper, a shoulder surfing resistant graphical authentication scheme is proposed to tackle a major issue related to the graphical authentication schemes developed. The proposed scheme provides a high level of resistance to shoulder surfing attacks, mitigating the need to upload pictures and aids in finding chosen objects in the scheme. However, the schemes has some vulnerabilities which implies that there may not be a perfect graphical authentication scheme; each scheme has its merits and demerits making it a suitable candidate for different environment and/or event depending on its architecture.

Shoulder Surfing Resistant Graphical Authentication Scheme for Web Based Applications

Since the design and development of the first graphical authentication pioneered by Blonder in 1996, numerous research has been conducted on this area to be used in different scenarios especially on the Internet. One of the major motivators is the picture superiority which as studies have shown, states that images/pictures provide higher memorability as opposed to Text based authentication. However, graphical authentication is still faced with some challenges. In this paper, a shoulder surfing resistant graphical authentication scheme is proposed to tackle a major issue related to the graphical authentication schemes developed. The proposed scheme provides a high level of resistance to shoulder surfing attacks, mitigating the need to upload pictures and aids in finding chosen objects in the scheme. However, the schemes has some vulnerabilities which implies that there may not be a perfect graphical authentication scheme; each scheme has its merits and demerits making it a suitable candidate for different environment and/or event depending on its architecture.

Seun Ebiesuwa
Seun Ebiesuwa Babcock University
Ariweriokuma
Ariweriokuma
P.E.
P.E.
Akinsanya
Akinsanya
Adebola
Adebola

No Figures found in article.

Seun Ebiesuwa. 2018. “. Global Journal of Computer Science and Technology – C: Software & Data Engineering GJCST-C Volume 17 (GJCST Volume 17 Issue C3): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Issue Cover
GJCST Volume 17 Issue C3
Pg. 15- 23
Classification
GJCST-C Classification: D.2.6, H.5.2
Keywords
Article Matrices
Total Views: 6022
Total Downloads: 1609
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Shoulder Surfing Resistant Graphical Authentication Scheme for Web Based Applications

Seun Ebiesuwa
Seun Ebiesuwa Babcock University
Ariweriokuma
Ariweriokuma
P.E.
P.E.
Akinsanya
Akinsanya
Adebola
Adebola

Research Journals