Secure graphical password based on cued click points using fuzzy logic

被引:1
|
作者
Ghiyamipour, Fatemeh [1 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Sci & Res Branch, Shahrood, Iran
关键词
authentication; edge detection; fuzzy logic; graphical password; image encryption; security;
D O I
10.1002/spy2.140
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays authentication technology is the most important means to ensure security. Alphanumeric username and password procedure is the most common authentication method. Users typically choose memorable passwords that are easy for attackers to guess, and assigned passwords by the system are difficult for users to remember. We present a graphical password based on cued recall in which is secured from shoulder surfing attack. Also, we propose an image encryption technique using a 2D cat map and edge detection technique in which it uses fuzzy logic inference to detect the edge of images. Then the user password is encrypted before storing it in the database using this method. Experiments illustrate that the proposed method has good performance in usability and security.
引用
收藏
页数:26
相关论文
共 50 条
  • [41] Fuzzy Logic-Based Secure and Fault Tolerant Job Scheduling in Grid
    王乘
    蒋从锋
    刘小虎
    [J]. Tsinghua Science and Technology, 2007, (S1) : 45 - 50
  • [42] A fuzzy logic-based secure hierarchical routing scheme using firefly algorithm in Internet of Things for healthcare
    Mehdi Hosseinzadeh
    Joon Yoo
    Saqib Ali
    Jan Lansky
    Stanislava Mildeova
    Mohammad Sadegh Yousefpoor
    Omed Hassan Ahmed
    Amir Masoud Rahmani
    Lilia Tightiz
    [J]. Scientific Reports, 13
  • [43] A fuzzy logic-based secure hierarchical routing scheme using firefly algorithm in Internet of Things for healthcare
    Hosseinzadeh, Mehdi
    Yoo, Joon
    Ali, Saqib
    Lansky, Jan
    Mildeova, Stanislava
    Yousefpoor, Mohammad Sadegh
    Ahmed, Omed Hassan
    Rahmani, Amir Masoud
    Tightiz, Lilia
    [J]. SCIENTIFIC REPORTS, 2023, 13 (01)
  • [44] Classification using RBFNs based on fuzzy logic
    Gao, CM
    Shao, MZ
    Gao, SH
    [J]. IGARSS 2000: IEEE 2000 INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM, VOL I - VI, PROCEEDINGS, 2000, : 2149 - 2151
  • [45] A secure password-based authentication and key agreement scheme using smart cards
    Mishra, Dheerendra
    Das, Ashok Kumar
    Chaturvedi, Ankita
    Mukhopadhyay, Sourav
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 23 : 28 - 43
  • [46] Query Based Location Aware Energy Efficient Secure Multicast Routing for Wireless Sensor Networks Using Fuzzy Logic
    Chandrasekaran, Karthick
    Chinnasamy, Kathirvel
    [J]. TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2023, 30 (06): : 1791 - 1798
  • [47] Application of Fuzzy Logic in a Secure Beacon-Based Guidance System for Public Transportation
    Molina-Gil, Jezabel
    Caballero-Gil, Pino
    Quesada-Arencibia, Alexis
    de Blasio, Gabriele Salvatore
    [J]. INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCE, 2022, 32 (03) : 371 - 387
  • [48] SECURE AND QOS AWARE FUZZY LOGIC BASED ROUTING FOR UNDERGROUND COAL MINE MONITORING
    Srikanth, Banda
    Kumar, Hemant
    Rao, Karanam U. M.
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2019, 12 (01): : 11 - 30
  • [49] An adaptive fuzzy logic based secure routing protocol in mobile ad hoc networks
    Nie, Jing
    Wen, Jiangchua
    Luo, Ji
    He, Xin
    Zhou, Zheng
    [J]. FUZZY SETS AND SYSTEMS, 2006, 157 (12) : 1704 - 1712
  • [50] Securing Access to Internet of Medical Things Using a Graphical-Password-Based User Authentication Scheme
    Khan, Mudassar Ali
    Din, Ikram Ud
    Almogren, Ahmad
    [J]. SUSTAINABILITY, 2023, 15 (06)