A Secured One Time Password Authentication Technique using (3,3) Visual Cryptography Scheme

被引:7
|
作者
Christiana, Abikoye Oluwakemi [1 ]
Oluwatobi, Akande Noah [2 ]
Victory, Garuba Ayomide [1 ]
Oluwaseun, Ogundokun Roseline [2 ]
机构
[1] Univ Ilorin, Dept Comp Sci, Ilorin, Kwara State, Nigeria
[2] Landmark Univ, Dept Comp Sci, Data & Informat Secur Res Grp, Omu Aran, Kwara State, Nigeria
关键词
Data Security; Information Security; One Time Password; Visual Cryptography Scheme; Progressive Visual Cryptography;
D O I
10.1088/1742-6596/1299/1/012059
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
The world is vastly becoming a completely digital one with most transactions carried out over the internet. This has exposed the internet to increasing threats and attacks and has necessitated the need for an internet-based authentication and authorization services. One Time Passwords (OTP) have been introduced to overcome the limitations of static passwords. However, research has shown that OTP are not completely free from middle man attacks. This paper presents a (3, 3) Visual Cryptographic Scheme (VCS) technique for OTP security. The technique secures the generated OTP image by dividing it into three shares, of which one of the shares will be sent to the user while the remaining shares will be stored at different locations on the server. Before the original OTP image will be recovered, all the shares must the retrieved and stacked together. To avoid pixel expansion problem and loss of image quality that have characterized existing VCS technique, progressive visual cryptography was adopted to decrypt the retrieved OTP shares. A high quality OTP image was recovered as revealed by the peak signal to noise ratio values and there was no change in size of the OTP images.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] A copyright protection scheme for digital images using visual cryptography technique
    Lou, Der-Chyuan
    Tso, Hao-Kuan
    Liu, Jiang-Lung
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 125 - 131
  • [42] Comments on Yeh-Shen-Hwang's one-time password authentication scheme
    You, IS
    Cho, K
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (02) : 751 - 753
  • [43] A S/Key-like One-Time Password Authentication Scheme Using Smart Cards for Smart Meter
    Lee, Wei-Bin
    Chen, Tzung-Her
    Sun, Wei-Rung
    Ho, Kevin I-J
    [J]. 2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, : 281 - 286
  • [44] Ghost imaging-based optical multilevel authentication scheme using visual cryptography
    Kang, Yi
    Kanwal, Saima
    Pu, Shengli
    Liu, Baolin
    Zhang, Dawei
    [J]. OPTICS COMMUNICATIONS, 2023, 526
  • [45] An Inter-device Authentication Scheme for Smart Homes Using One-Time-Password Over Infrared Channel
    Raniyal, Maninder Singh
    Woungang, Isaac
    Dhurandher, Sanjay Kumar
    [J]. INTELLIGENT, SECURE, AND DEPENDABLE SYSTEMS IN DISTRIBUTED AND CLOUD ENVIRONMENTS (ISDDC 2017), 2017, 10618 : 95 - 117
  • [46] COMPARATIVE ANALYSIS OF ONE TIME PASSWORD AUTHENTICATION ARCHITECTURES USING MOBILE DEVICES
    Stoica, Marian
    Trif, Silvia
    [J]. INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY, 2012, : 91 - 96
  • [47] Authentication mechanism using one-time password for 802.11 wireless LAN
    Vaidya, Binod
    Lee, SangDuck
    Han, Jae-Kyun
    Han, SeungJo
    [J]. COMPUTER SCIENCE - THEORY AND APPLICATIONS, 2006, 3967 : 619 - 628
  • [48] Cryptanalysis on one-time password authentication schemes using counter value
    Tsuji, T
    Shimizu, A
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (06) : 1756 - 1759
  • [49] Ubiquitous One-Time Password Service Using the Generic Authentication Architecture
    Chunhua Chen
    Chris J. Mitchell
    Shaohua Tang
    [J]. Mobile Networks and Applications, 2013, 18 : 738 - 747
  • [50] Proposal for Optical One-time Password Authentication Using Digital Holography
    Jeon, Seok Hee
    Gil, Sang Keun
    [J]. JOURNAL OF THE OPTICAL SOCIETY OF KOREA, 2016, 20 (06) : 722 - 732