Secure graphical password based on cued click points using fuzzy logic

被引:1
|
作者
Ghiyamipour, Fatemeh [1 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Sci & Res Branch, Shahrood, Iran
关键词
authentication; edge detection; fuzzy logic; graphical password; image encryption; security;
D O I
10.1002/spy2.140
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays authentication technology is the most important means to ensure security. Alphanumeric username and password procedure is the most common authentication method. Users typically choose memorable passwords that are easy for attackers to guess, and assigned passwords by the system are difficult for users to remember. We present a graphical password based on cued recall in which is secured from shoulder surfing attack. Also, we propose an image encryption technique using a 2D cat map and edge detection technique in which it uses fuzzy logic inference to detect the edge of images. Then the user password is encrypted before storing it in the database using this method. Experiments illustrate that the proposed method has good performance in usability and security.
引用
收藏
页数:26
相关论文
共 50 条
  • [11] Improved Persuasive Cued Click Points for Knowledge-Based Authentication
    Ashwini, M.
    Sreedhar, K. C.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (11): : 95 - 100
  • [12] Secure Online Examination by using Graphical Own Image Password Scheme
    Mathapati, Mahantesh
    Kumaran, T. Senthil
    Kumar, A. Krishna
    Kumar, S. Vinoth
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND MANAGEMENT FOR COMPUTING, COMMUNICATION, CONTROLS, ENERGY AND MATERIALS (ICSTM), 2017, : 160 - 164
  • [13] Multiple Password Interference in Text Passwords and Click-Based Graphical Passwords
    Chiasson, Sonia
    Forget, Alain
    Stobert, Elizabeth
    van Oorschot, P. C.
    Biddle, Robert
    [J]. CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 500 - 511
  • [14] Gaze-Based Graphical Password Using Webcam
    Tiwari, Abhishek
    Pal, Rajarshi
    [J]. INFORMATION SYSTEMS SECURITY, ICISS 2018, 2018, 11281 : 448 - 461
  • [15] Keystroke Identifier Using Fuzzy Logic to Increase Password Security
    Shaout, Adnan
    Schmidt, Nathan
    [J]. 2020 21ST INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2020,
  • [16] A Lightweight Scalable and Secure Blockchain Based IoT Using Fuzzy Logic
    N. Anita
    M. Vijayalakshmi
    S. Mercy Shalinie
    [J]. Wireless Personal Communications, 2022, 125 : 2129 - 2146
  • [17] A Lightweight Scalable and Secure Blockchain Based IoT Using Fuzzy Logic
    Anita, N.
    Vijayalakshmi, M.
    Shalinie, S. Mercy
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 125 (03) : 2129 - 2146
  • [18] Pristine PixCaptcha as Graphical Password for Secure eBanking using Gaussian Elimination and Cleaves Algorithm
    Chithra, P. L.
    Sathya, K.
    [J]. 2018 2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, AND SIGNAL PROCESSING (ICCCSP): SPECIAL FOCUS ON TECHNOLOGY AND INNOVATION FOR SMART ENVIRONMENT, 2018, : 128 - 133
  • [19] Click and Session Based-Captcha as Graphical Password Authentication Schemes for Smart Phone and Web
    Kolekar, Vikas K.
    Vaidya, Milindkumar B.
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING (ICIP), 2015, : 669 - 674
  • [20] A Hopfield Neural Network Approach for Authentication of Password Based on Fuzzy Logic
    Lekshmi, K.
    Krishnaveni, K. S.
    Aparna, V. K.
    [J]. 2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 2471 - 2474