A Secured One Time Password Authentication Technique using (3,3) Visual Cryptography Scheme

被引:8
作者
Christiana, Abikoye Oluwakemi [1 ]
Oluwatobi, Akande Noah [2 ]
Victory, Garuba Ayomide [1 ]
Oluwaseun, Ogundokun Roseline [2 ]
机构
[1] Univ Ilorin, Dept Comp Sci, Ilorin, Kwara State, Nigeria
[2] Landmark Univ, Dept Comp Sci, Data & Informat Secur Res Grp, Omu Aran, Kwara State, Nigeria
来源
3RD INTERNATIONAL CONFERENCE ON SCIENCE AND SUSTAINABLE DEVELOPMENT (ICSSD 2019): SCIENCE, TECHNOLOGY AND RESEARCH: KEYS TO SUSTAINABLE DEVELOPMENT | 2019年 / 1299卷
关键词
Data Security; Information Security; One Time Password; Visual Cryptography Scheme; Progressive Visual Cryptography;
D O I
10.1088/1742-6596/1299/1/012059
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
The world is vastly becoming a completely digital one with most transactions carried out over the internet. This has exposed the internet to increasing threats and attacks and has necessitated the need for an internet-based authentication and authorization services. One Time Passwords (OTP) have been introduced to overcome the limitations of static passwords. However, research has shown that OTP are not completely free from middle man attacks. This paper presents a (3, 3) Visual Cryptographic Scheme (VCS) technique for OTP security. The technique secures the generated OTP image by dividing it into three shares, of which one of the shares will be sent to the user while the remaining shares will be stored at different locations on the server. Before the original OTP image will be recovered, all the shares must the retrieved and stacked together. To avoid pixel expansion problem and loss of image quality that have characterized existing VCS technique, progressive visual cryptography was adopted to decrypt the retrieved OTP shares. A high quality OTP image was recovered as revealed by the peak signal to noise ratio values and there was no change in size of the OTP images.
引用
收藏
页数:10
相关论文
共 20 条
[1]  
[Anonymous], 2015, INT J COMPUTER SCI I, P14
[2]  
[Anonymous], 2015, PROC INT C CIRCUITS, DOI DOI 10.1109/ICCPCT.2015.7159471
[3]   User-friendly threshold visual cryptography with complementary cover images [J].
Chiu, Pei-Ling ;
Lee, Kai-Hui .
SIGNAL PROCESSING, 2015, 108 :476-488
[4]   A Visual One-Time Password Authentication Scheme Using Mobile Devices [J].
Chow, Yang-Wai ;
Susilo, Willy ;
Au, Man Ho ;
Barmawi, Ari Moesriami .
INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 :243-257
[5]  
Christiana Abikoye Oluwakemi, 2019, J APPL SCI ENG, V22
[6]  
Dhiman K., 2017, COMPUTERS ELECT ENG, P1
[7]  
Hamdare Safa, 2014, INT J ENG TRENDS TEC, V11, P154
[8]   An Optimal (k,n)Visual Secret Sharing Scheme for Information Security [J].
Hodeish, Mahmoud E. ;
Bukauskas, Linas ;
Humbe, Vikas T. .
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS, 2016, 93 :760-767
[9]  
Isawa R., 2011, ONE TIME PASSWORD AU, P225
[10]   A Review on Noisy Password, Voiceprint Biometric and One-Time-Password [J].
Kumbhare, Komal K. ;
Warkar, K. V. .
1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 :382-386