scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Graphical password based mouse behavior technique

01 Feb 2021-Vol. 1755, Iss: 1, pp 012021
TL;DR: The proposed technique allows the user to keep the ease-of-use in the mouse motion, while minimizing the risk of password guessing, in a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks.
Abstract: This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it. This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance of the password. The proposed technique in this paper allows the user to keep the ease-of-use in the mouse motion, while minimizing the risk of password guessing. A comparative evaluation has been conducted against a traditional password. The results show that the proposed approach improves the complexity 200% for fix position technique and two variants technique but more than 200% for three variants technique.
Citations
More filters
Proceedings ArticleDOI
22 Feb 2023
TL;DR: A coloring bipartite graph (CBG) is the main point in creating new version of the symmetric encryption (SE) scheme as mentioned in this paper , and the security issue of the CBG-SE scheme is determined.
Abstract: A coloring bipartite graph (CBG) is a main point in this work for creating new version of the symmetric encryption (SE) scheme. The security of this version has been increased comparing with other ES schemes, since a shared secret key is generated based on the CBG. The ciphertext of a plaintext reaches to receiver as the CBG. A new experimental result of CBG-SE scheme is presented through study case. The security issue of the CBG-SE scheme is determined. The CBG-SE scheme considers as an alternative insight for symmetric communications with more security.
TL;DR: The you only look once (YOLO) detector has been retrained to better recognize objects in UAV photographs and competes with other deep-learning frameworks such as the faster region convolutional neural network.
Abstract: Received Jun 1, 2022 Revised Jul 15, 2022 Accepted Aug 16, 2022 An unmanned aerial vehicle (UAV) image recognition system in real-time is proposed in this study. To begin, the you only look once (YOLO) detector has been retrained to better recognize objects in UAV photographs. The trained YOLO detector makes a trade-off between speed and precision in object recognition and localization to account for four typical moving entities caught by UAVs (cars, buses, trucks, and people). An additional 1500 UAV photographs captured by the embedded UAV camera are fed into the YOLO, which uses those probabilities to estimate the bounding box for the entire image. When it comes to object detection, the YOLO competes with other deep-learning frameworks such as the faster region convolutional neural network. The proposed system is tested on a wild test set of 1500 UAV photographs with graphics processing unit GPU acceleration, proving that it can distinguish objects in UAV images effectively and consistently in real-time at a detection speed of 60 frames per second.
References
More filters
Journal ArticleDOI
TL;DR: PassPoints is described, a new and more secure graphical password system, and an empirical study comparing the use of PassPoints to alphanumeric passwords is reported, which shows that the graphical password users created a valid password with fewer difficulties than the alphan numeric users.
Abstract: Computer security depends largely on passwords to authenticate human users. However, users have difficulty remembering passwords over time if they choose a secure password, i.e. a password that is long and random. Therefore, they tend to choose short and insecure passwords. Graphical passwords, which consist of clicking on images rather than typing alphanumeric strings, may help to overcome the problem of creating secure and memorable passwords. In this paper we describe PassPoints, a new and more secure graphical password system. We report an empirical study comparing the use of PassPoints to alphanumeric passwords. Participants created and practiced either an alphanumeric or graphical password. The participants subsequently carried out three longitudinal trials to input their password over the course of 6 weeks. The results show that the graphical password users created a valid password with fewer difficulties than the alphanumeric users. However, the graphical users took longer and made more invalid password inputs than the alphanumeric users while practicing their passwords. In the longitudinal trials the two groups performed similarly on memory of their password, but the graphical group took more time to input a password.

713 citations


"Graphical password based mouse beha..." refers background or methods in this paper

  • ...Mouse distance By moving the mouse over an image size N*N, 20*20 tolerance as recommended by [6], each chosen pixel is calculated (See Fig 2)....

    [...]

  • ...Furthermore, [6] presented Pass Points, a scheme where users can click anywhere on a picture to create their passwords....

    [...]

Journal ArticleDOI
TL;DR: Li et al. as discussed by the authors proposed two Zipf-like models (i.e., PDF-Zipf and CDF-ZipF) to characterize the distribution of passwords and proposed a new metric for measuring the strength of password data sets.
Abstract: Despite three decades of intensive research efforts, it remains an open question as to what is the underlying distribution of user-generated passwords. In this paper, we make a substantial step forward toward understanding this foundational question. By introducing a number of computational statistical techniques and based on 14 large-scale data sets, which consist of 113.3 million real-world passwords, we, for the first time, propose two Zipf-like models (i.e., PDF-Zipf and CDF-Zipf) to characterize the distribution of passwords. More specifically, our PDF-Zipf model can well fit the popular passwords and obtain a coefficient of determination larger than 0.97; our CDF-Zipf model can well fit the entire password data set, with the maximum cumulative distribution function (CDF) deviation between the empirical distribution and the fitted theoretical model being 0.49%~4.59% (on an average 1.85%). With the concrete knowledge of password distributions, we suggest a new metric for measuring the strength of password data sets. Extensive experimental results show the effectiveness and general applicability of the proposed Zipf-like models and security metric.

300 citations

Proceedings ArticleDOI
17 Oct 2011
TL;DR: A user verification system using mouse dynamics, which is both accurate and efficient enough for future usage, and uses much more fine-grained (point-by-point) angle-based metrics of mouse movements for user verification.
Abstract: Biometric authentication verifies a user based on its inherent, unique characteristics --- who you are. In addition to physiological biometrics, behavioral biometrics has proven very useful in authenticating a user. Mouse dynamics, with their unique patterns of mouse movements, is one such behavioral biometric. In this paper, we present a user verification system using mouse dynamics, which is both accurate and efficient enough for future usage. The key feature of our system lies in using much more fine-grained (point-by-point) angle-based metrics of mouse movements for user verification. These new metrics are relatively unique from person to person and independent of the computing platform. Moreover, we utilize support vector machines (SVMs) for accurate and fast classification. Our technique is robust across different operating platforms, and no specialized hardware is required. The efficacy of our approach is validated through a series of experiments. Our experimental results show that the proposed system can verify a user in an accurate and timely manner, and induced system overhead is minor.

265 citations


Additional excerpts

  • ...In this study [18] the author examines the effectiveness of mouse dynamics on users’ behavior by conducting an experiment on 17 volunteers....

    [...]

Journal ArticleDOI
TL;DR: This work is developing and evaluating a method for the measurement of affective states through motor-behavioral parameters from standard input devices (mouse and keyboard).
Abstract: Emotions are an increasingly important factor in Human-Computer Interaction (HCI). Up to the present, emotion recognition in HCI implies the use of explicit or intrusive methods, for example, video cameras or physiological measurements. We are developing and evaluating a method for the measurement of affective states through motor-behavioral parameters from standard input devices (mouse and keyboard).

204 citations


"Graphical password based mouse beha..." refers background in this paper

  • ...The idea of the proposed work based on human behavior has been studied by [21]....

    [...]

Journal ArticleDOI
Bin Zhu1, Jeff Yan2, Guanbo Bao, Maowei Yang3, Ning Xu1 
TL;DR: A novel family of graphical password systems built on top of Captcha technology, which is called Captcha as graphical passwords (CaRP), which offers reasonable security and usability and appears to fit well with some practical applications for improving online security.
Abstract: Many security primitives are based on hard mathematical problems. Using hard AI problems for security is emerging as an exciting new paradigm, but has been under-explored. In this paper, we present a new security primitive based on hard AI problems, namely, a novel family of graphical password systems built on top of Captcha technology, which we call Captcha as graphical passwords (CaRP). CaRP is both a Captcha and a graphical password scheme. CaRP addresses a number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual-view technologies, shoulder-surfing attacks. Notably, a CaRP password can be found only probabilistically by automatic online guessing attacks even if the password is in the search set. CaRP also offers a novel approach to address the well-known image hotspot problem in popular graphical password systems, such as PassPoints, that often leads to weak password choices. CaRP is not a panacea, but it offers reasonable security and usability and appears to fit well with some practical applications for improving online security.

92 citations


"Graphical password based mouse beha..." refers background in this paper

  • ...Graphical passwords authentication Graphical password authentication has been studied by various scholars, [9] introduced a new primitive security on the basis of captcha graphical password (CaRP)....

    [...]