skip to main content
10.1145/1315245.1315252acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Do background images improve "draw a secret" graphical passwords?

Authors Info & Claims
Published:28 October 2007Publication History

ABSTRACT

Draw a secret (DAS) is a representative graphical password scheme. Rigorous theoretical analysis suggests that DAS supports an overall password space larger than that of the ubiquitous textual password scheme. However, recent research suggests that DAS users tend to choose weak passwords, and their choices would render this theoretically sound scheme less secure in real life.

In this paper we investigate the novel idea of introducing background images to the DAS scheme, where users were initially supposed to draw passwords on a blank canvas overlaid with a grid. Encouraging results from our two user studies have shown that people aided with background images tended to set significantly more complicated passwords than their counterparts using the original scheme. The background images also reduced other predictable characteristics in DAS passwords such as symmetry and centering within the drawing grid, further improving the strength of the passwords. We estimate that the average strength of successfully recalled passwords in the enhanced scheme was increased over those created using the original scheme by more than 10 bits. Moreover, a positive effect was observed with respect to the memorability of the more complex passwords encouraged by the background images.

References

  1. G. Blonder. Graphical passwords. US Patent 5559961, 1996.Google ScholarGoogle Scholar
  2. S. Brostoff and M. A. Sasse. Are Passfaces more usable than passwords? A field trial investigation. Proc. of HCI, 2000, pp 405--424Google ScholarGoogle ScholarCross RefCross Ref
  3. S. Chiasson, R. Biddle and P. C. van Oorschot. A Second Look at the Usability of Click-Based Graphical Passwords. Symposium on Usable Privacy and Security, July 2007, CMU, USA. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. Davis, F. Monrose, and M. K. Reiter. On user choice in graphical password schemes. Usenix Security, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. E. Dirik, N. Memon and J.-C. Birget. Modeling User Choice in the PassPoints Graphical Password Scheme. SOUPS'07. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Goldberg, J. Hagman, and V. Sazawal. Doodling Our Way to Better Authentication, Extended Abstracts CHI'02, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin. The Design and Analysis of Graphical Passwords, Proc. USENIX Security Symposium, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D. Nali and J. Thorpe. Analyzing User Choice in Graphical Passwords, Technical Report TR-04-01, School of Computer Science, Carleton University, 2004.Google ScholarGoogle Scholar
  9. D. Norman. Things That Make Us Smart: Defending Human Attributes in the Age of the Machine. Addison Wesley, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Real User Corporation. The Science Behind Passfaces. Revision 2, Sept. 2001. Available at http://www.realuser.com/published/ScienceBehindPassfaces.pdf.Google ScholarGoogle Scholar
  11. X. Suo, Y. Zhu and G. S. Owen. Graphical Passwords: A Survey. ACSAC, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Thorpe and P. C. van Oorschot. Graphical Dictionaries and the Memorable Space of Graphical Passwords. Proc. USENIX Security Symposium, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Thorpe and P. C. van Oorschot. Towards secure design choices for implementing graphical passwords. ACSAC, 2004. An extended version available at http://www.scs.carleton.ca/~jthorpe/extendedStrokes.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J. Thorpe and P. C. van Oorschot. Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. Usenix Security, Aug 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy and N. Memon. PassPoints: design and longitudinal evaluation of a graphical password system. Int'l J. of Human Computer Studies. vol. 63, pp.102--127, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy and N. Memon. Authentication using graphical passwords: effects of tolerance and image choice. SOUPS'05, CMU, USA. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Yan, A. Blackwell, R. Anderson and A. Grant. Password Memorability and Security: Empirical Results. IEEE Security & Privacy, Vol. 2 No. 5, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Yan. A Note on Proactive Password Checking. ACM New Security Paradigms Workshop, New Mexico, USA, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. VisKey, http://www.sfr-software.de/cms/EN/pocketpc/viskey/index.html, last accessed in Feb, 2007.Google ScholarGoogle Scholar
  20. V-GO, http://www.passlogix.com/, last accessed in Feb, 2007Google ScholarGoogle Scholar

Index Terms

  1. Do background images improve "draw a secret" graphical passwords?

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '07: Proceedings of the 14th ACM conference on Computer and communications security
        October 2007
        628 pages
        ISBN:9781595937032
        DOI:10.1145/1315245

        Copyright © 2007 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 28 October 2007

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        CCS '07 Paper Acceptance Rate55of302submissions,18%Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader