Security Assessment of the Image-Based Authentication Using Screen-Capture Tools

被引:0
|
作者
Oh, Insu [1 ]
Lee, Yeunsu [1 ]
Lee, Hyeji [1 ]
Lee, Kyungroul [2 ]
Yim, Kangbin [1 ]
机构
[1] Soonchunhyang Univ, Dept Informat Secur Engn, Asan, South Korea
[2] Soonchunhyang Univ, R&BD Ctr Secur & Safety Ind SSI, Asan, South Korea
基金
新加坡国家研究基金会;
关键词
D O I
10.1007/978-3-319-61542-4_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A password-based user-authentication method is inputted from the keyboard, but the safety of the data is no longer ensured due to the theft of keyboard data. For this reason, a novel authentication method emerged whereby both mouse data and screen information are used, and this image-based authentication does not require the keyboard for the input of the password. This important method authenticates users based on the clicked information from the mouse that are within the specific positions of a displayed image. Just like the password-authentication method for which the keyboard is used, the security of the image-based authentication method is also now threatened because the displayed image and the clicked information of the mouse can be exposed; furthermore, the research studies that have assessed these security threats are insufficient. In this paper, the security of the image-based authentication is therefore analyzed according to the screen-capture tools that are easy to obtain from the Internet. The results of this paper can be utilized as a reference to improve the security of the image-based authentication in the future.
引用
收藏
页码:156 / 161
页数:6
相关论文
共 50 条
  • [31] An image-based screen identifies a small molecule regulator of megakaryopoiesis
    Boitano, Anthony E.
    de Lichtervelde, Lorenzo
    Snead, Jennifer L.
    Cooke, Michael P.
    Schultz, Peter G.
    PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2012, 109 (35) : 14019 - 14023
  • [32] Tea authentication and determination of chemical constituents using digital image-based fingerprint signatures and chemometrics
    Fernandes, Jessica Silva
    Fernandes, David Douglas de Sousa
    Pistonesi, Marcelo Fabian
    Diniz, Paulo Henrique Goncalves Dias
    FOOD CHEMISTRY, 2023, 421
  • [33] Bridge Inspection and Condition Assessment Using Image-Based Technologies with UAVs
    Hiasa, Shuhei
    Karaaslan, Enes
    Shattenkirk, Wesley
    Mildner, Chase
    Catbas, F. Necati
    STRUCTURES CONGRESS 2018: BRIDGES, TRANSPORTATION STRUCTURES, AND NONBUILDING STRUCTURES, 2018, : 217 - 228
  • [34] Image based mutual authentication to enhance the web security
    Suresh Kumar, K. (sureshkumar@saveetha.ac.in), 1600, Science and Engineering Research Support Society (09):
  • [35] Resection of giant invasive sacral schwannoma using image-based customized osteotomy tools
    Lin, Cheng-Li
    Fang, Jing-Jing
    Lin, Ruey-Mo
    EUROPEAN SPINE JOURNAL, 2016, 25 (12) : 4103 - 4107
  • [36] Resection of giant invasive sacral schwannoma using image-based customized osteotomy tools
    Cheng-Li Lin
    Jing-Jing Fang
    Ruey-Mo Lin
    European Spine Journal, 2016, 25 : 4103 - 4107
  • [37] Transcribing screen-capture data: the process of developing a transcription system for multi-modal text-based data
    Meredith, Joanne
    INTERNATIONAL JOURNAL OF SOCIAL RESEARCH METHODOLOGY, 2016, 19 (06) : 663 - 676
  • [38] Vulnerability Analysis on the Image-Based Authentication Through the PS/2 Interface
    Oh, Insu
    Lee, Kyungroul
    Lee, Sun-Young
    Do, Kyunghwa
    Ahn, Hyo Beom
    Yim, Kangbin
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2018, 2019, 773 : 212 - 219
  • [39] A Secure Image-Based Authentication Scheme Employing DNA Crypto and Steganography
    Misbahuddin, Mohammed
    Sreeja, C. S.
    PROCEEDING OF THE THIRD INTERNATIONAL SYMPOSIUM ON WOMEN IN COMPUTING AND INFORMATICS (WCI-2015), 2015, : 595 - 601
  • [40] Usability and acceptance of UF-IBA, an image-based authentication system
    Harsh, Piyush
    Newman, Richard E.
    41ST ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2007, : 285 - 291