Security Assessment of the Image-Based Authentication Using Screen-Capture Tools

被引:0
|
作者
Oh, Insu [1 ]
Lee, Yeunsu [1 ]
Lee, Hyeji [1 ]
Lee, Kyungroul [2 ]
Yim, Kangbin [1 ]
机构
[1] Soonchunhyang Univ, Dept Informat Secur Engn, Asan, South Korea
[2] Soonchunhyang Univ, R&BD Ctr Secur & Safety Ind SSI, Asan, South Korea
基金
新加坡国家研究基金会;
关键词
D O I
10.1007/978-3-319-61542-4_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A password-based user-authentication method is inputted from the keyboard, but the safety of the data is no longer ensured due to the theft of keyboard data. For this reason, a novel authentication method emerged whereby both mouse data and screen information are used, and this image-based authentication does not require the keyboard for the input of the password. This important method authenticates users based on the clicked information from the mouse that are within the specific positions of a displayed image. Just like the password-authentication method for which the keyboard is used, the security of the image-based authentication method is also now threatened because the displayed image and the clicked information of the mouse can be exposed; furthermore, the research studies that have assessed these security threats are insufficient. In this paper, the security of the image-based authentication is therefore analyzed according to the screen-capture tools that are easy to obtain from the Internet. The results of this paper can be utilized as a reference to improve the security of the image-based authentication in the future.
引用
收藏
页码:156 / 161
页数:6
相关论文
共 50 条
  • [1] Security analysis of and proposal for image-based authentication
    Newman, RE
    Harsh, P
    Jayaraman, P
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 141 - 144
  • [2] Flipped Classroom Using Screen-Capture Video
    McCann, Daniel
    FASEB JOURNAL, 2015, 29
  • [3] Image-Based Authentication Security Improvement by Randomized Selection Approach
    Balajee, R. M.
    Kannan, M. K. Jayanthi
    Mohan, V. Murali
    INVENTIVE COMPUTATION AND INFORMATION TECHNOLOGIES, ICICIT 2021, 2022, 336 : 61 - 71
  • [4] A Study on Security Evaluation Methodology for Image-based Biometrics Authentication Systems
    Tanabe, Yasuhiro
    Yoshizoe, Kazuki
    Imai, Hideki
    2009 IEEE 3RD INTERNATIONAL CONFERENCE ON BIOMETRICS: THEORY, APPLICATIONS AND SYSTEMS, 2009, : 258 - +
  • [5] A Protection Technique for Screen Image-Based Authentication Protocols Utilizing the SetCursorPos Function
    Oh, Insu
    Lee, Kyungroul
    Yim, Kangbin
    INFORMATION SECURITY APPLICATIONS, 2018, 10763 : 236 - 245
  • [6] Image-based multimodal face authentication
    Pigeon, S
    Vandendorpe, L
    SIGNAL PROCESSING, 1998, 69 (01) : 59 - 79
  • [7] Wavelet domain scrambling for image-based authentication
    Ginesu, Giaime
    Giusto, Daniele D.
    Onali, Tatiana
    2006 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-13, 2006, : 1561 - 1564
  • [8] Image-based rendering using image-based priors
    Fitzgibbon, A
    Wexler, Y
    Zisserman, A
    INTERNATIONAL JOURNAL OF COMPUTER VISION, 2005, 63 (02) : 141 - 151
  • [9] Image-Based Rendering Using Image-Based Priors
    Andrew Fitzgibbon
    Yonatan Wexler
    Andrew Zisserman
    International Journal of Computer Vision, 2005, 63 : 141 - 151
  • [10] Image-based rendering using image-based priors
    Fitzgibbon, A
    Wexler, Y
    Zisserman, A
    NINTH IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION, VOLS I AND II, PROCEEDINGS, 2003, : 1176 - 1183