Jiya Gloria Kaka, Oyefolahan O. Ishaq, Joseph O. Ojeniyi
{"title":"基于识别的图形密码算法综述","authors":"Jiya Gloria Kaka, Oyefolahan O. Ishaq, Joseph O. Ojeniyi","doi":"10.1109/CYBERNIGERIA51635.2021.9428801","DOIUrl":null,"url":null,"abstract":"User Authentication is an important aspect of information security. Alphanumeric passwords are the most common and widely adopted means of user authentication. Nevertheless, there are several disadvantages attached to the alphanumeric forms of authentication. Example, users choose passwords that are easy to guess (dates of births, their names, car plate number) in other to remember them, because difficult passwords are not easily remembered. This brought about the alternative of graphical passwords because research have been carried out to proof that humans find it easier to recall images. This paper reviews 10 recognition-based graphical password algorithms, and the common usability and security threats of these systems based on these algorithms were analyzed. This paper also suggests future research directions.","PeriodicalId":208301,"journal":{"name":"2020 IEEE 2nd International Conference on Cyberspac (CYBER NIGERIA)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Recognition-Based Graphical Password Algorithms: A Survey\",\"authors\":\"Jiya Gloria Kaka, Oyefolahan O. Ishaq, Joseph O. Ojeniyi\",\"doi\":\"10.1109/CYBERNIGERIA51635.2021.9428801\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"User Authentication is an important aspect of information security. Alphanumeric passwords are the most common and widely adopted means of user authentication. Nevertheless, there are several disadvantages attached to the alphanumeric forms of authentication. Example, users choose passwords that are easy to guess (dates of births, their names, car plate number) in other to remember them, because difficult passwords are not easily remembered. This brought about the alternative of graphical passwords because research have been carried out to proof that humans find it easier to recall images. This paper reviews 10 recognition-based graphical password algorithms, and the common usability and security threats of these systems based on these algorithms were analyzed. This paper also suggests future research directions.\",\"PeriodicalId\":208301,\"journal\":{\"name\":\"2020 IEEE 2nd International Conference on Cyberspac (CYBER NIGERIA)\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-02-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE 2nd International Conference on Cyberspac (CYBER NIGERIA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CYBERNIGERIA51635.2021.9428801\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 2nd International Conference on Cyberspac (CYBER NIGERIA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CYBERNIGERIA51635.2021.9428801","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Recognition-Based Graphical Password Algorithms: A Survey
User Authentication is an important aspect of information security. Alphanumeric passwords are the most common and widely adopted means of user authentication. Nevertheless, there are several disadvantages attached to the alphanumeric forms of authentication. Example, users choose passwords that are easy to guess (dates of births, their names, car plate number) in other to remember them, because difficult passwords are not easily remembered. This brought about the alternative of graphical passwords because research have been carried out to proof that humans find it easier to recall images. This paper reviews 10 recognition-based graphical password algorithms, and the common usability and security threats of these systems based on these algorithms were analyzed. This paper also suggests future research directions.