A Tabular Steganography Scheme for Graphical Password Authentication

被引:3
作者
Lin, Tsung-Hung [2 ]
Lee, Cheng-Chi [1 ,4 ]
Tsai, Chwei-Shyong [3 ]
Guo, Shin-Dong [4 ]
机构
[1] Fu Jen Catholic Univ, Dept Lib & Informat Sci, Taipei, Taiwan
[2] Natl Chin Yi Univ Technol, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[3] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 40227, Taiwan
[4] Asia Univ, Dept Photon & Commun Engn, Taichung, Taiwan
关键词
graphical password authentication; security; teganography; protocol;
D O I
10.2298/CSIS081223028L
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication, authorization and auditing are the most important issues of security on data communication. In particular, authentication is the life of every individual essential closest friend. The user authentication security is dependent on the strength of user password. A secure password is usually random, strange, very long and difficult to remember. For most users, remember these irregular passwords are very difficult. To easily remember and security are two sides of one coin. In this paper, we propose a new graphical password authentication protocol to solve this problem. Graphical password authentication technology is the use of click on the image to replace input some characters. The graphical user interface can help user easy to create and remember their secure passwords. However, in the graphical password system based on images can provide an alternative password, but too many images will be a large database to store issue. All the information can be steganography to achieve our scheme to solve the problem of database storage. Furthermore, tabular steganography technique can achieve our scheme to solve the information eavesdropping problem during data transmission. Our modified graphical password system can help user easily and friendly to memorize their password and without loss of any security of authentication. User's chosen input will be hidden into image using steganography technology, and will be transferred to server security without any hacker problem. And then, our authentication server only needs to store only a secret key for decryption instead of large password database.
引用
收藏
页码:823 / 841
页数:19
相关论文
共 50 条
  • [21] Robust Password and Smart Card Based Authentication Scheme with Smart Card Revocation
    谢琪
    刘文浩
    王圣宝
    胡斌
    董娜
    于秀源
    JournalofShanghaiJiaotongUniversity(Science), 2014, 19 (04) : 418 - 424
  • [22] Graphical Password Scheme using Persuasive Cued Click Points
    Kaja, Sachin
    Gupta, Divya
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES FOR SMART NATION (SMARTTECHCON), 2017, : 639 - 643
  • [23] Bu-Dash: A Universal and Dynamic Graphical Password Scheme
    Andriotis, Panagiotis
    Kirby, Myles
    Takasu, Atsuhiro
    HCI FOR CYBERSECURITY, PRIVACY AND TRUST, HCI-CPT 2022, 2022, 13333 : 209 - 227
  • [24] Why That Picture? Discovering Password Properties in Recognition-Based Graphical Authentication
    Mihajlov, Martin
    Jerman-Blazic, Borka
    Shuleska, Anita Ciunova
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, 2016, 32 (12) : 975 - 988
  • [25] A remote password authentication scheme based on the digital signature method
    Hwang, MS
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1999, 70 (04) : 657 - 666
  • [26] A Token Free Password Authentication Scheme with Multiple Key Agreements
    Chang, Chin-Chen
    Tsai, Hao-Chuan
    Lin, Shi-Yi
    2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 1086 - +
  • [27] A high quality image sharing with steganography and adaptive authentication scheme
    Wu, Chia-Chun
    Kao, Shang-Juh
    Hwang, Min-Shiang
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (12) : 2196 - 2207
  • [28] A New Password-Based Multi-server Authentication Scheme Robust to Password Guessing Attacks
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 71 (03) : 1977 - 1988
  • [29] An enhanced smart card based remote user password authentication scheme
    Li, Xiong
    Niu, Jianwei
    Khan, Muhammad Khurram
    Liao, Junguo
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (05) : 1365 - 1371
  • [30] A secure and efficient one-time password authentication scheme for WSN
    Ling C.-H.
    Lee C.-C.
    Yang C.-C.
    Hwang M.-S.
    Hwang, Min-Shiang (mshwang@ asia. edu.tw), 1600, Femto Technique Co., Ltd. (19): : 177 - 181