Security Assessment of the Image-Based Authentication Using Screen-Capture Tools

被引:0
|
作者
Oh, Insu [1 ]
Lee, Yeunsu [1 ]
Lee, Hyeji [1 ]
Lee, Kyungroul [2 ]
Yim, Kangbin [1 ]
机构
[1] Soonchunhyang Univ, Dept Informat Secur Engn, Asan, South Korea
[2] Soonchunhyang Univ, R&BD Ctr Secur & Safety Ind SSI, Asan, South Korea
基金
新加坡国家研究基金会;
关键词
D O I
10.1007/978-3-319-61542-4_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A password-based user-authentication method is inputted from the keyboard, but the safety of the data is no longer ensured due to the theft of keyboard data. For this reason, a novel authentication method emerged whereby both mouse data and screen information are used, and this image-based authentication does not require the keyboard for the input of the password. This important method authenticates users based on the clicked information from the mouse that are within the specific positions of a displayed image. Just like the password-authentication method for which the keyboard is used, the security of the image-based authentication method is also now threatened because the displayed image and the clicked information of the mouse can be exposed; furthermore, the research studies that have assessed these security threats are insufficient. In this paper, the security of the image-based authentication is therefore analyzed according to the screen-capture tools that are easy to obtain from the Internet. The results of this paper can be utilized as a reference to improve the security of the image-based authentication in the future.
引用
收藏
页码:156 / 161
页数:6
相关论文
共 50 条
  • [11] Generating assessment tests using image-based items
    Popescu, Doru Anastasiu
    Constantin, Doru
    Bold, Nicolae
    2023 23RD IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW 2023, 2023, : 379 - 385
  • [12] Capture configuration for image-based street walkthroughs
    Lee, DH
    Jung, SK
    2003 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2003, : 151 - 157
  • [13] Image-based hair capture by inverse lighting
    Grabli, S
    Sillion, FX
    Marschner, SR
    Lengyel, JE
    GRAPHICS INTERFACE 2002, PROCEEDINGS, 2002, : 51 - 58
  • [14] A secure image-based authentication scheme for mobile devices
    Li, Z
    Sun, QB
    Lian, Y
    Giusto, DD
    ADVANCES IN INTELLIGENT COMPUTING, PT 2, PROCEEDINGS, 2005, 3645 : 751 - 760
  • [15] Interactive tools for image-based stereoscopic artwork
    Stavrakis, Efstathios
    Gelautz, Margrit
    STEREOSCOPIC DISPLAYS AND APPLICATIONS XIX, 2008, 6803
  • [16] Advances Image-Based Automated Security System
    Kumar, Sunil
    Mishra, Rashmi
    Jain, Tanvi
    Shankar, Achyut
    INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES, 2024, 15 (01)
  • [17] Towards image-based cancer cell lines authentication using deep neural networks
    Mzurikwao, Deogratias
    Khan, Muhammad Usman
    Samuel, Oluwarotimi Williams
    Cinatl, Jindrich, Jr.
    Wass, Mark
    Michaelis, Martin
    Marcelli, Gianluca
    Ang, Chee Siang
    SCIENTIFIC REPORTS, 2020, 10 (01)
  • [18] Towards image-based cancer cell lines authentication using deep neural networks
    Deogratias Mzurikwao
    Muhammad Usman Khan
    Oluwarotimi Williams Samuel
    Jindrich Cinatl
    Mark Wass
    Martin Michaelis
    Gianluca Marcelli
    Chee Siang Ang
    Scientific Reports, 10
  • [19] Assessing image-based authentication techniques in a web-based environment
    Jali M.Z.
    Furnell S.M.
    Dowland P.S.
    Information Management and Computer Security, 2010, 18 (01): : 43 - 53
  • [20] Image-based strength assessment of bone
    Hangartner, Thomas N.
    2007 ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY, VOLS 1-16, 2007, : 4425 - 4428