Secure graphical password based on cued click points using fuzzy logic

被引:1
|
作者
Ghiyamipour, Fatemeh [1 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Sci & Res Branch, Shahrood, Iran
关键词
authentication; edge detection; fuzzy logic; graphical password; image encryption; security;
D O I
10.1002/spy2.140
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays authentication technology is the most important means to ensure security. Alphanumeric username and password procedure is the most common authentication method. Users typically choose memorable passwords that are easy for attackers to guess, and assigned passwords by the system are difficult for users to remember. We present a graphical password based on cued recall in which is secured from shoulder surfing attack. Also, we propose an image encryption technique using a 2D cat map and edge detection technique in which it uses fuzzy logic inference to detect the edge of images. Then the user password is encrypted before storing it in the database using this method. Experiments illustrate that the proposed method has good performance in usability and security.
引用
收藏
页数:26
相关论文
共 50 条
  • [21] Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism
    Chiasson, Sonia
    Stobert, Elizabeth
    Forget, Alain
    Biddle, Robert
    van Oorschot, Paul C.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (02) : 222 - 235
  • [22] Trust based Secure Routing Protocol using Fuzzy Logic in Wireless Sensor Networks
    Renubala, S.
    Dhanalakshmi, K. S.
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 1264 - 1268
  • [23] Secure Gamma Generation For Stream Cipher based on Fuzzy Logic
    Alnajjar, Khaled
    Anikin, Igor
    [J]. 2020 VI INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND NANOTECHNOLOGY (IEEE ITNT-2020), 2020,
  • [24] A Secure LOADng Routing Protocol Scheme Based Fuzzy Logic
    Sana, Touhami
    Mohamed, Belghachi
    [J]. Informatica (Slovenia), 2024, 48 (18): : 139 - 148
  • [25] Scatter Plots Based on Fuzzy Logic in Supporting the Design of Graphical Interfaces
    Grobelny, Jerzy
    Michalski, Rafal
    [J]. ARTIFICIAL INTELLIGENCE IN HCI, AI-HCI 2023, PT I, 2023, 14050 : 506 - 518
  • [26] Water quality monitoring with fuzzy logic control based on graphical programming
    [J]. Ichsan, Mochammad Hannats Hanafi (hanas.hanafi@ub.ac.id), 1600, Universitas Ahmad Dahlan (14):
  • [27] Minutia verification using fuzzy logic and geographic points of reference
    Vert, G
    Nasser, S
    [J]. FUZZ-IEEE 2005: PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS: BIGGEST LITTLE CONFERENCE IN THE WORLD, 2005, : 839 - 844
  • [28] Secure Hash-Based Password Authentication Protocol Using Smartcards
    Jung, Hyunhee
    Kim, Hyun Sung
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2011, PT V, 2011, 6786 : 593 - 606
  • [29] Implementation and evaluations of graphical password using object-based image ranking
    Nguyen, Cuong Xuan
    Huang, Hung-Hsuan
    Kawagoe, Kyoji
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2014, 29 (04): : 285 - 295
  • [30] Implementation and evaluations of graphical password using object-based image ranking
    Ritsumeikan University, Shiga, Japan
    [J]. Comput Syst Sci Eng, 4 (285-295):