A Tabular Steganography Scheme for Graphical Password Authentication

被引:3
|
作者
Lin, Tsung-Hung [2 ]
Lee, Cheng-Chi [1 ,4 ]
Tsai, Chwei-Shyong [3 ]
Guo, Shin-Dong [4 ]
机构
[1] Fu Jen Catholic Univ, Dept Lib & Informat Sci, Taipei, Taiwan
[2] Natl Chin Yi Univ Technol, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[3] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 40227, Taiwan
[4] Asia Univ, Dept Photon & Commun Engn, Taichung, Taiwan
关键词
graphical password authentication; security; teganography; protocol;
D O I
10.2298/CSIS081223028L
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication, authorization and auditing are the most important issues of security on data communication. In particular, authentication is the life of every individual essential closest friend. The user authentication security is dependent on the strength of user password. A secure password is usually random, strange, very long and difficult to remember. For most users, remember these irregular passwords are very difficult. To easily remember and security are two sides of one coin. In this paper, we propose a new graphical password authentication protocol to solve this problem. Graphical password authentication technology is the use of click on the image to replace input some characters. The graphical user interface can help user easy to create and remember their secure passwords. However, in the graphical password system based on images can provide an alternative password, but too many images will be a large database to store issue. All the information can be steganography to achieve our scheme to solve the problem of database storage. Furthermore, tabular steganography technique can achieve our scheme to solve the information eavesdropping problem during data transmission. Our modified graphical password system can help user easily and friendly to memorize their password and without loss of any security of authentication. User's chosen input will be hidden into image using steganography technology, and will be transferred to server security without any hacker problem. And then, our authentication server only needs to store only a secret key for decryption instead of large password database.
引用
收藏
页码:823 / 841
页数:19
相关论文
共 50 条
  • [41] An Improved Password Authentication Scheme for Smart Card
    Tsai, Cheng-Yi
    Pan, Chiu-Shu
    Hwang, Min-Shiang
    RECENT DEVELOPMENTS IN INTELLIGENT SYSTEMS AND INTERACTIVE APPLICATIONS (IISA2016), 2017, 541 : 194 - 199
  • [42] Password authentication scheme preserving identity privacy
    Yang, Fuw-Yi
    Hsu, Chih-Wei
    Chiu, Su-Hui
    2014 SIXTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2014, : 443 - 447
  • [43] PassMap: A Map Based Graphical-Password Authentication System
    Sun, Hung-Min
    Chen, Yao-Hsin
    Fang, Chiung-Cheng
    Chang, Shih-Ying
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [44] Timestamp-based Password Authentication Scheme
    Ismail, E. S.
    Syed-Musa, S. M. S.
    PROCEEDING OF THE 25TH NATIONAL SYMPOSIUM ON MATHEMATICAL SCIENCES (SKSM25): MATHEMATICAL SCIENCES AS THE CORE OF INTELLECTUAL EXCELLENCE, 2018, 1974
  • [45] Improvement Upon Mutual Password Authentication Scheme
    Zhu, Lu
    Yu, Sheng
    Zhang, Xing
    ISBIM: 2008 INTERNATIONAL SEMINAR ON BUSINESS AND INFORMATION MANAGEMENT, VOL 1, 2009, : 400 - +
  • [47] Development Status and Prospects of Graphical Password Authentication System in Korea
    Yang, Gi-Chul
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (11): : 5755 - 5772
  • [48] Comparison Between BlindLogin and Other Graphical Password Authentication Systems
    Ho, Yean Li
    Lau, Siong Hoe
    Azman, Afizan
    ADVANCES IN CYBER SECURITY (ACES 2019), 2020, 1132 : 235 - 246
  • [49] Jumbled PassSteps: A Hotspot Guessing Attack Resistant Graphical Password Authentication Scheme Based on the Modified PassMatrix Method
    Songcuan, Jerome P.
    Sison, Ariel M.
    PROCEEDINGS OF 2019 THE 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP 2019) WITH WORKSHOP 2019 THE 4TH INTERNATIONAL CONFERENCE ON MULTIMEDIA AND IMAGE PROCESSING (ICMIP 2019), 2019, : 55 - 59
  • [50] Analysis of a two-factor graphical password scheme
    Luigi Catuogno
    Clemente Galdi
    International Journal of Information Security, 2014, 13 : 421 - 437