A Tabular Steganography Scheme for Graphical Password Authentication

被引:3
|
作者
Lin, Tsung-Hung [2 ]
Lee, Cheng-Chi [1 ,4 ]
Tsai, Chwei-Shyong [3 ]
Guo, Shin-Dong [4 ]
机构
[1] Fu Jen Catholic Univ, Dept Lib & Informat Sci, Taipei, Taiwan
[2] Natl Chin Yi Univ Technol, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[3] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 40227, Taiwan
[4] Asia Univ, Dept Photon & Commun Engn, Taichung, Taiwan
关键词
graphical password authentication; security; teganography; protocol;
D O I
10.2298/CSIS081223028L
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication, authorization and auditing are the most important issues of security on data communication. In particular, authentication is the life of every individual essential closest friend. The user authentication security is dependent on the strength of user password. A secure password is usually random, strange, very long and difficult to remember. For most users, remember these irregular passwords are very difficult. To easily remember and security are two sides of one coin. In this paper, we propose a new graphical password authentication protocol to solve this problem. Graphical password authentication technology is the use of click on the image to replace input some characters. The graphical user interface can help user easy to create and remember their secure passwords. However, in the graphical password system based on images can provide an alternative password, but too many images will be a large database to store issue. All the information can be steganography to achieve our scheme to solve the problem of database storage. Furthermore, tabular steganography technique can achieve our scheme to solve the information eavesdropping problem during data transmission. Our modified graphical password system can help user easily and friendly to memorize their password and without loss of any security of authentication. User's chosen input will be hidden into image using steganography technology, and will be transferred to server security without any hacker problem. And then, our authentication server only needs to store only a secret key for decryption instead of large password database.
引用
收藏
页码:823 / 841
页数:19
相关论文
共 50 条
  • [31] Graphical password authentication using cued click points
    Chiasson, Sonia
    van Oorschot, P. C.
    Biddle, Robert
    COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 359 - +
  • [32] Click Based Graphical Passward with Text Password Authentication
    Borkar, Vina S.
    Golar, Priti C.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (11): : 76 - 79
  • [33] Pixel Value Graphical Password Scheme: K-Means as Graphical Password Fault Tolerance
    Shukran, Mohd Afizi Mohd
    Khairuddin, Mohammad Adib
    Yunus, Mohd Sidek Fadhil Mohd
    Ismail, Mohd Nazri
    Isa, Mohd Rizal Mohd
    Amran, Mohd Fahmi Mohamad
    Ahmad, Fatimah
    Wahab, Norshahriah
    Abdullah, Muhammad Naim
    Zaidi, Nur Adnin Ahmad
    Zuikiplee, Syed Muzzameer Syed
    INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING SYSTEMS, 2021, 12 : 23 - 29
  • [34] Securing Access to Internet of Medical Things Using a Graphical-Password-Based User Authentication Scheme
    Khan, Mudassar Ali
    Din, Ikram Ud
    Almogren, Ahmad
    SUSTAINABILITY, 2023, 15 (06)
  • [35] Analysis and Evaluation of the ColorLogin Graphical Password Scheme
    Gao, Haichang
    Liu, Xiyang
    Dai, Ruyi
    Wang, Sidong
    Chang, Xiuling
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON IMAGE AND GRAPHICS (ICIG 2009), 2009, : 722 - 727
  • [36] A graphical password scheme strongly resistant to spyware
    Hong, DW
    Man, S
    Hawes, B
    Matthews, M
    SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 94 - 100
  • [37] A password authentication scheme over insecure networks
    Liao, I-En
    Lee, Cheng-Chi
    Hwang, Min-Shiang
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2006, 72 (04) : 727 - 740
  • [38] Password Authentication Based on Fractal Coding Scheme
    Al-Saidi, Nadia M. G.
    Said, Mohamad Rushdan Md
    Othman, Wan Ainun M.
    JOURNAL OF APPLIED MATHEMATICS, 2012,
  • [39] Virtual Password Authentication Scheme in Hashed Domain
    Rahiemy, Mohammad Zakie Faiz
    Sukarno, Parman
    2019 7TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2019, : 235 - 240
  • [40] A PASSWORD AUTHENTICATION SCHEME BASED ON DISCRETE LOGARITHMS
    WU, TC
    CHANG, CC
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1991, 41 (1-2) : 31 - 38