Article, 2023

GPOD: An Efficient and Secure Graphical Password Authentication System by Fast Object Detection

Multimedia Tools and Applications, ISSN 1573-7721, 1380-7501, Volume 83, 19, Pages 56569-56618, 10.1007/s11042-023-17571-4

Contributors

Ray, Palash 0000-0001-5741-7630 (Corresponding author) [1] Giri, Debasis 0000-0003-3033-3036 [2] Meng, Wei-Zhi 0000-0003-4384-5786 [3] Hore, Soumyadeep 0000-0002-9326-291X [1]

Affiliations

  1. [1] Haldia Institute of Technology
  2. [NORA names: India; Asia, South];
  3. [2] Maulana Abul Kalam Azad University of Technology, West Bengal
  4. [NORA names: India; Asia, South];
  5. [3] Technical University of Denmark
  6. [NORA names: DTU Technical University of Denmark; University; Denmark; Europe, EU; Nordic; OECD]

Abstract

Nowadays, the graphical password has gained significant recognition and has become a subject of extensive investigation within the research community. The proliferation of Internet usage has resulted in individuals accessing various web applications from any location worldwide, utilizing personal computers, mobile phones, and other touch-enabled devices. However, individuals frequently employ passwords that are weak and commonly used due to their inability to recall complex passwords. This renders the systems susceptible to various forms of attacks. Hence, there is a requirement for an authentication scheme that possesses qualities such as resilience, ease of memorability, and security. Graphical passwords are significantly more effective than text-based passwords in terms of memorability. Nevertheless, numerous schemes are susceptible to various forms of attacks, such as shoulder surfing attacks, man-in-the-middle attacks, database attacks, random guess attacks, and so forth. Moreover, the compromise between security and usability concerns is evident in different graphical authentication schemes. Therefore, we present a novel graphical authentication scheme that ensures both security and usability. This scheme incorporates random graphical objects blended with a background image, resulting in the generation of a distinct graphical challenge. The objects that have been chosen must undergo verification through the utilization of an object detection algorithm known as YOLOv3. In order to strengthen the security of GPOD (Graphical password with object detection), user data is subjected to encryption and subsequently stored on the server, thereby mitigating the risk of potential database attacks. Additionally, the user data undergoes encryption prior to its transmission to the server in order to alleviate the risk of man-in-the-middle attacks. The proposed GPOD scheme is a straightforward, usable, resilient, shoulder-surf-resistant, and secure graphical authentication scheme. The scheme exhibits excellent performance, with an accuracy rate of up to 94.80% and a login time ranging from 9.61 to 14.56 seconds in two scenarios, respectively.

Keywords

GPOD, Graphical Password Authentication System, Internet usage, Web, YOLOv3, accuracy, accuracy rate, algorithm, applications, attacks, authentication, authentication scheme, authentication system, background, background image, challenges, community, complex passwords, compromise, computer, concerns, data, database, database attacks, detection, detection algorithm, devices, encryption, excellent performance, fast object detection, fasting, form, generation, graphical authentication schemes, graphical objects, graphical passwords, guessing attack, images, individuals, investigation, location, login, login time, man-in-the-middle, man-in-the-middle attack, memorization, mobile phones, object detection, object detection algorithm, objective, password, password authentication system, performance, personal computer, phone, proliferation, quality, random guessing attacks, rate, recognition, research, research community, resilience, risk, risk of man-in-the-middle attacks, scenarios, scheme, security, server, shoulder, shoulder surfing attacks, shoulder-surfing resistance, subjects, susceptible to various forms, system, text-based passwords, time, touch-enabled devices, transmission, usability, usability concerns, usage, user data, users, utilization, verification, web application

Data Provider: Digital Science