A Tabular Steganography Scheme for Graphical Password Authentication

被引:3
作者
Lin, Tsung-Hung [2 ]
Lee, Cheng-Chi [1 ,4 ]
Tsai, Chwei-Shyong [3 ]
Guo, Shin-Dong [4 ]
机构
[1] Fu Jen Catholic Univ, Dept Lib & Informat Sci, Taipei, Taiwan
[2] Natl Chin Yi Univ Technol, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[3] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 40227, Taiwan
[4] Asia Univ, Dept Photon & Commun Engn, Taichung, Taiwan
关键词
graphical password authentication; security; teganography; protocol;
D O I
10.2298/CSIS081223028L
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication, authorization and auditing are the most important issues of security on data communication. In particular, authentication is the life of every individual essential closest friend. The user authentication security is dependent on the strength of user password. A secure password is usually random, strange, very long and difficult to remember. For most users, remember these irregular passwords are very difficult. To easily remember and security are two sides of one coin. In this paper, we propose a new graphical password authentication protocol to solve this problem. Graphical password authentication technology is the use of click on the image to replace input some characters. The graphical user interface can help user easy to create and remember their secure passwords. However, in the graphical password system based on images can provide an alternative password, but too many images will be a large database to store issue. All the information can be steganography to achieve our scheme to solve the problem of database storage. Furthermore, tabular steganography technique can achieve our scheme to solve the information eavesdropping problem during data transmission. Our modified graphical password system can help user easily and friendly to memorize their password and without loss of any security of authentication. User's chosen input will be hidden into image using steganography technology, and will be transferred to server security without any hacker problem. And then, our authentication server only needs to store only a secret key for decryption instead of large password database.
引用
收藏
页码:823 / 841
页数:19
相关论文
共 50 条
  • [31] Enhancing of a Password-Based Authentication Scheme Using Smart Cards
    Lee, Youngsook
    Won, Dongho
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2009, PT 2, 2009, 5871 : 879 - +
  • [32] A remote password authentication scheme for multiserver architecture using neural networks
    Li, LH
    Lin, IC
    Hwang, MS
    IEEE TRANSACTIONS ON NEURAL NETWORKS, 2001, 12 (06): : 1498 - 1504
  • [33] Cryptanalysis of a User Anonymous Password Authentication Scheme Without Smart Card
    Lin, Hao
    Wen, Feng-Tong
    Du, Chun-Xia
    2016 INTERNATIONAL CONFERENCE ON SERVICE SCIENCE, TECHNOLOGY AND ENGINEERING (SSTE 2016), 2016, : 293 - 298
  • [34] The Weakness of Moon et al.'s Password Authentication Scheme
    Irawan, Bam-bang
    Hwang, Min-shiang
    3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [35] Dual-Stage Biometrics-Based Password Authentication Scheme Using Smart Cards
    Boopathi, Mythili
    Aramudhan, M.
    CYBERNETICS AND SYSTEMS, 2017, 48 (05) : 415 - 435
  • [36] AN ENHANCED PASSWORD-BASED USER AUTHENTICATION SCHEME FOR GRID COMPUTING
    Wu, Zhen-Yu
    Chung, Yufang
    Lai, Feipei
    Chen, Tzer-Shyong
    Lee, Hung-Chang
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (7A): : 3751 - 3760
  • [37] SECURE SMART CARD BASED PASSWORD AUTHENTICATION SCHEME WITH USER ANONYMITY
    Li, Chun-Ta
    INFORMATION TECHNOLOGY AND CONTROL, 2011, 40 (02): : 157 - 162
  • [38] A robust authentication scheme with dynamic password for wireless body area networks
    Liu, Xin
    Zhang, Ruisheng
    Zhao, Mingqi
    COMPUTER NETWORKS, 2019, 161 : 220 - 234
  • [39] Design of a user anonymous password authentication scheme without smart card
    Kumari, Saru
    Khan, Muhammad Khurram
    Li, Xiong
    Wu, Fan
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (03) : 441 - 458
  • [40] Secure server-server communication for dual stage biometrics - based password authentication scheme
    Boopathi, Mythili
    Aramudhan, M.
    ALEXANDRIA ENGINEERING JOURNAL, 2018, 57 (02) : 819 - 829