Using Theme-based Narrative Construct of Images as Passwords: Implementation and Assessment of Remembered Sequences
Keywords:Cybersecurity, Image-based passwords, Authentication, Sequence Learning, Cartoon Sequence, ElectroEncephaloGraphy.
Secret keys connecting users to the system is the heart of cryptographic systems. With the recent wars, several cryptographic systems that use alpha-numeric passwords have been known to be vulnerable to many attacks. Image based password systems were introduced to add more complexity and security. This paper employs human uniqueness of narrative skills on an image-based password system with focus on theme in the password generation process. To generate the secret password, a specially designed computer game was used. We used narrative constructs composed of cartoon image sequences to generate user-speciﬁc secret key. The durability of generated passwords and the authentication process while assessing the reconstruction process by a potential hacker was verified. Under imposed psychological duress, users failed retrieving the password sequence suggesting the reliability as an anti-coercive attack cybersecurity tool. A set of experiments were used to analyze user behavior behind the image-based password system. EEG measurements demonstrated increased activity of α rhythms in F3 and FC5 channel bins and augmented levels of β rhythms in F3 and O1 channels, suggesting users added personalization to authentication more than in alpha-numeric password-based logins.
How to Cite
The submitting author warrants that the submission is original and that she/he is the author of the submission together with the named co-authors; to the extend the submission incorporates text passages, figures, data or other material from the work of others, the submitting author has obtained any necessary permission.
Articles in this journal are published under the Creative Commons Attribution Licence (CC-BY What does this mean?). This is to get more legal certainty about what readers can do with published articles, and thus a wider dissemination and archiving, which in turn makes publishing with this journal more valuable for you, the authors.
By submitting an article the author grants to this journal the non-exclusive right to publish it. The author retains the copyright and the publishing rights for his article without any restrictions.