JOURNAL ARTICLE

Graphical User Authentication Algorithms Based on Recognition

Zena M. SaadiAhmed T. SadiqOmar Z. Akif

Year: 2024 Journal:   ARO-The Scientific Journal of Koya University Vol: 12 (2)Pages: 79-93   Publisher: Koya University

Abstract

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical user authentication and possible attacks on nineteen recognition-based authentication systems were discussed. In this study, differentiation table of attack patterns for all recognition-based techniques is shown. Finally, the positive and negative aspects of nineteen methods were explained in the form of a detailed table.

Keywords:
Computer science Authentication (law) Algorithm Human–computer interaction Artificial intelligence Computer security

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
42
Refs
0.21
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems
Biometric Identification and Security
Physical Sciences →  Computer Science →  Signal Processing
Advanced Steganography and Watermarking Techniques
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition

Related Documents

© 2026 ScienceGate Book Chapters — All rights reserved.