Using theme-based narrative construct of images as passwords: Implementation and assessment of remembered sequences

被引:4
作者
Chellaiah P. [1 ,4 ]
Nair B. [2 ]
Achuthan K. [3 ]
Diwakar S. [4 ]
机构
[1] Amrita School of Biotechnology, Amrita University
[2] Amrita Center for Cyber-Security Systems and Networks, Amrita Vishwa Vidyapeetham University
[3] School of Biotechnology, Amrita Vishwa Vidyapeetham University
[4] School of Biotechnology, Amrita University
关键词
Authentication; Cartoon Sequence; Cybersecurity; ElectroEncephaloGraphy; Image-based passwords; Sequence Learning;
D O I
10.3991/ijoe.v13i11.7774
中图分类号
学科分类号
摘要
With many online engineering platforms such as virtual and remote laboratories designed for young or aged users, user authentication and passwords-based methods are being re-evaluated for tracking usage patterns and security. For ICT-enabled online engineering platforms, image-based humancentric approaches are gaining relevance for access frameworks. With the rubber- hose attacks, increased senior users, many existing systems are vulnerable to many attacks. This paper employs human uniqueness of narrative skills on an image-based password system for online platforms with focus on theme in the password generation process. To generate the secret password, a specially designed computer game was used. We used narrative constructs composed of cartoon image sequences to generate user-speci!c secret key. The durability of generated passwords and the authentication process while assessing the reconstruction process by a potential hacker was verified. For validating use of coerced attacks, under imposed psychological duress, users failed retrieving the password sequence suggesting the reliability as an anti-coercive attack cybersecurity tool. A set of experiments were used to analyze user behavior behind the image-based password system. EEG measurements demonstrated increased activity of " rhythms in F3 and FC5 channel bins and augmented levels of α rhythms in F3 and O1 channels, suggesting users added personalization to authentication more than in alpha-numeric password-based logins.
引用
收藏
页码:77 / 93
页数:16
相关论文
共 31 条
[1]  
Diwakar S., Kumar D., Radhamani R.R., Sasidharakurup H., Nizar N., Achuthan K., Nedungadi P., Raman R., Nair B., Complementing Education via Virtual Labs: Implementation and Deployment of Remote Laboratories and Usage Analysis in South Indian Villages,, Int. J. Online Eng, 12, 3, pp. 8-15, (2016)
[2]  
Tselios N., Avouris N., Komis V., The effective combination of hybrid usability methods in evaluating educational applications of ICT%: Issues and challenges,, pp. 55-76, (2008)
[3]  
Bocconi S., Dini S., Ferlino L., Martinoli C., Ott M., ICT Educational Tools and Visually Impaired Students: Different Answers to Different Accessibility Needs,, Univers. Access Human-Computer Interact. Appl. Serv, pp. 491-500, (2007)
[4]  
Sayago S., Blat J., Older people and ICT: Towards understanding real-life usability and experiences created in everyday interactions with interactive technologies,, In Lecture Notes in Computer Science, pp. 154-163
[5]  
O'Gorman L., Comparing passwords, tokens, and biometrics for user authentication,, Proc. IEEE, 91, 12, pp. 2021-2040, (2003)
[6]  
Kale A., Sundaresan A., Rajagopalan A.N., Cuntoor N.P., Roy-Chowdhury A.K., Kruger V., Chellappa R., Identification of humans using gait,, IEEE Trans. Image Process, 13, 9, pp. 1163-1173, (2004)
[7]  
Hari Priya M., Lalithamani N., A Survey for Securing Online Payment Transaction Using Biometrics Authentication,, Springer Verlag, 517, pp. 81-91, (2017)
[8]  
Ashok A., Poornachandran P., Achuthan K., Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions,, Springer, pp. 168-177, (2012)
[9]  
De Angeli A., Coventry L., Johnson G., Renaud K., Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems,, Int. J. Hum. Comput. Stud, 63, 1-2, pp. 128-152, (2005)
[10]  
Wiedenbeck S., Waters J., Birget J.-C., Brodskiy A., Memon N., Authentication using graphical passwords: Basic Results,, Proc. 11th Human-Computer Interact. Int. Conf. (HCII 2005), (2005)