A Tabular Steganography Scheme for Graphical Password Authentication

被引:3
|
作者
Lin, Tsung-Hung [2 ]
Lee, Cheng-Chi [1 ,4 ]
Tsai, Chwei-Shyong [3 ]
Guo, Shin-Dong [4 ]
机构
[1] Fu Jen Catholic Univ, Dept Lib & Informat Sci, Taipei, Taiwan
[2] Natl Chin Yi Univ Technol, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[3] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 40227, Taiwan
[4] Asia Univ, Dept Photon & Commun Engn, Taichung, Taiwan
关键词
graphical password authentication; security; teganography; protocol;
D O I
10.2298/CSIS081223028L
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication, authorization and auditing are the most important issues of security on data communication. In particular, authentication is the life of every individual essential closest friend. The user authentication security is dependent on the strength of user password. A secure password is usually random, strange, very long and difficult to remember. For most users, remember these irregular passwords are very difficult. To easily remember and security are two sides of one coin. In this paper, we propose a new graphical password authentication protocol to solve this problem. Graphical password authentication technology is the use of click on the image to replace input some characters. The graphical user interface can help user easy to create and remember their secure passwords. However, in the graphical password system based on images can provide an alternative password, but too many images will be a large database to store issue. All the information can be steganography to achieve our scheme to solve the problem of database storage. Furthermore, tabular steganography technique can achieve our scheme to solve the information eavesdropping problem during data transmission. Our modified graphical password system can help user easily and friendly to memorize their password and without loss of any security of authentication. User's chosen input will be hidden into image using steganography technology, and will be transferred to server security without any hacker problem. And then, our authentication server only needs to store only a secret key for decryption instead of large password database.
引用
收藏
页码:823 / 841
页数:19
相关论文
共 50 条
  • [1] A NOVEL GRAPHICAL PASSWORD AUTHENTICATION SCHEME WITH IMPROVED USABILITY
    Khodadadi, Touraj
    Rabiei, Faranak
    Zamani, Mazdak
    Javadianasl, Yashar
    Alizadeh, Mojtaba
    Chaeikar, Saman Shojae
    2021 4TH INTERNATIONAL SYMPOSIUM ON ADVANCED ELECTRICAL AND COMMUNICATION TECHNOLOGIES (ISAECT), 2021,
  • [2] TCpC: a graphical password scheme ensuring authentication for IoT resources
    Matta P.
    Pant B.
    International Journal of Information Technology, 2020, 12 (3) : 699 - 709
  • [3] Shoulder-surfing-proof graphical password authentication scheme
    Wu, Tzong-Sun
    Lee, Ming-Lun
    Lin, Han-Yu
    Wang, Chao-Yuan
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (03) : 245 - 254
  • [4] Shoulder-surfing-proof graphical password authentication scheme
    Tzong-Sun Wu
    Ming-Lun Lee
    Han-Yu Lin
    Chao-Yuan Wang
    International Journal of Information Security, 2014, 13 : 245 - 254
  • [5] Graphical Password Authentication Scheme Against Credential Leakage Attacks
    Chen J.
    Xu C.-X.
    Zhang Y.
    Jiang C.-S.
    Han Y.-X.
    Cao C.-C.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (12): : 5787 - 5806
  • [6] PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records
    Chu, Xian
    Sun, Huiping
    Chen, Zhong
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2020, 2020, 12063 : 166 - 176
  • [7] A Cued-Recall and Emotion Classification Graphical Password Authentication Scheme
    Vieira, Danilo E.
    Mesquita Abreu, Tonny L.
    Vizcarra Melgar, Max E.
    Santander, Luz A. M.
    2017 IEEE COLOMBIAN CONFERENCE ON COMMUNICATIONS AND COMPUTING (COLCOM), 2017,
  • [8] An Enhanced Graphical Authentication Scheme Using Multiple-Image Steganography
    Al-Shqeerat, Khalil Hamdi Ateyeh
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 44 (03): : 2095 - 2107
  • [9] Authentication using Alignment of the Graphical Password
    Shenoy, Manjula
    Supriya, A.
    PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON ADVANCED INFORMATICS FOR COMPUTING RESEARCH (ICAICR '19), 2019,
  • [10] AUTHENTICATION USING TEXT AND GRAPHICAL PASSWORD
    Joshi, Abhilash M.
    Muniyal, Balachandra
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 381 - 386