The Coin Passcode: A Shoulder-Surfing Proof Graphical Password Authentication Model for Mobile Devices
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 1
Abstract
Swiftness, simplicity, and security is crucial for mobile device authentication. Currently, most mobile devices are protected by a six pin numerical passcode authentication layer which is extremely vulnerable to Shoulder-Surfing attacks and Spyware attacks. This paper proposes a multi-elemental graphical password authentication model for mobile devices that are resistant to shoulder surfing attacks and spyware attacks. The proposed Coin Passcode model simplifies the complex user interface issues that previous graphical password models have, which work as a swift passcode security mechanism for mobile devices. The Coin Passcode model also has a high memorability rate compared to the existing numerical and alphanumerical passwords, as psychology studies suggest that human are better at remembering graphics than words. The results shows that the Coin Passcode is able to overcome the current shoulder-surfing and spyware attack vulnerability that existing mobile application numerical passcode authentication layers suffer from.
Authors and Affiliations
Teoh joo Fong, Azween Abdullah, NZ Jhanjhi, Mahadevan Supramaniam
Method for Texture Mapping of In-Vehicle Camera Image in 3D Map Creation
Method for texture mapping of in-vehicle camera image in 3D map creation is proposed. Top view of ground cover targets can be mapped easily. For instance, aerial photos, high spatial resolution of satellite imagery data...
A Machine Learning based Fine-Tuned and Stacked Model: Predictive Analysis on Cancer Dataset
The earlier forecast and location of disease cells can be useful in curing the illness in medical applications. Knowledge discovery is having many significant roles in health sector, bioinformatics etc. Plenty of hidden...
Identification and Evaluation of Functional Dependency Analysis using Rough sets for Knowledge Discovery
The process of data acquisition gained momentum due to the efficient representation of storage/retrieving systems. Due to the commercial and application value of these stored data, Database Management has become es...
Robust Image Watermarking using Fractional Sinc Transformation
The increased utilization of internet in sharing and dissemination of digital data makes it is very difficult to maintain copyright and ownership of data. Digital watermarking offers a method for authentication and copyr...
Smart Home Energy Management System Design: A Realistic Autonomous V2H / H2V Hybrid Energy Storage System
The hybrid fuel cell electric vehicle powered by household power during peak use is another opportunity to reduce emissions and save money. For this reason, Vehicle-to-Home (V2H) and Home-to-Vehicle (H2V) systems were pr...