A Secured One Time Password Authentication Technique using (3,3) Visual Cryptography Scheme

被引:7
|
作者
Christiana, Abikoye Oluwakemi [1 ]
Oluwatobi, Akande Noah [2 ]
Victory, Garuba Ayomide [1 ]
Oluwaseun, Ogundokun Roseline [2 ]
机构
[1] Univ Ilorin, Dept Comp Sci, Ilorin, Kwara State, Nigeria
[2] Landmark Univ, Dept Comp Sci, Data & Informat Secur Res Grp, Omu Aran, Kwara State, Nigeria
关键词
Data Security; Information Security; One Time Password; Visual Cryptography Scheme; Progressive Visual Cryptography;
D O I
10.1088/1742-6596/1299/1/012059
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
The world is vastly becoming a completely digital one with most transactions carried out over the internet. This has exposed the internet to increasing threats and attacks and has necessitated the need for an internet-based authentication and authorization services. One Time Passwords (OTP) have been introduced to overcome the limitations of static passwords. However, research has shown that OTP are not completely free from middle man attacks. This paper presents a (3, 3) Visual Cryptographic Scheme (VCS) technique for OTP security. The technique secures the generated OTP image by dividing it into three shares, of which one of the shares will be sent to the user while the remaining shares will be stored at different locations on the server. Before the original OTP image will be recovered, all the shares must the retrieved and stacked together. To avoid pixel expansion problem and loss of image quality that have characterized existing VCS technique, progressive visual cryptography was adopted to decrypt the retrieved OTP shares. A high quality OTP image was recovered as revealed by the peak signal to noise ratio values and there was no change in size of the OTP images.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] A Visual One-Time Password Authentication Scheme Using Mobile Devices
    Chow, Yang-Wai
    Susilo, Willy
    Au, Man Ho
    Barmawi, Ari Moesriami
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 243 - 257
  • [2] An Image Based Authentication Technique Using Visual Cryptography Scheme
    Dais, Annie, V
    Joe, Vijesh C.
    Sugi, Sidney Swarna S.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 124 - 129
  • [3] An Improved One-time Password Authentication Scheme
    Liu, Huiyi
    Zhang, Yuegong
    [J]. 2013 15TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2013, : 1 - 5
  • [4] Masquerade on one-time password authentication scheme
    Lin, Chun-Li
    Hung, Ching-Po
    [J]. PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, MAIN CONFERENCE PAPERS, VOL 1, 2007, : 278 - 282
  • [5] Sharing two true colour images using (3,3)-extended visual cryptography technique
    Dhiman, Kirti
    Kasana, Singara Singh
    [J]. JOURNAL OF MODERN OPTICS, 2018, 65 (17) : 1949 - 1959
  • [6] User's authentication in media services by using one-time password authentication scheme
    Wang, Neng-Wen
    Huang, Yueh-Min
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 623 - +
  • [7] One-time password password authentication scheme based on the negative database
    Zhao, Dongdong
    Luo, Wenjian
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2017, 62 : 396 - 404
  • [8] A secure one-time password authentication scheme using smart cards
    Yeh, TC
    Shen, HY
    Hwang, JJ
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2002, E85B (11) : 2515 - 2518
  • [9] Improvement of one-time password authentication scheme using smart cards
    Lee, NY
    Chen, JC
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (09) : 3765 - 3767
  • [10] Weaknesses and Improvements of a One-time Password Authentication Scheme
    Kim, Mijin
    Lee, Byunghee
    Kim, Seungjoo
    Won, Dongho
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2009, 2 (04): : 29 - 37