A Tabular Steganography Scheme for Graphical Password Authentication

被引:3
作者
Lin, Tsung-Hung [2 ]
Lee, Cheng-Chi [1 ,4 ]
Tsai, Chwei-Shyong [3 ]
Guo, Shin-Dong [4 ]
机构
[1] Fu Jen Catholic Univ, Dept Lib & Informat Sci, Taipei, Taiwan
[2] Natl Chin Yi Univ Technol, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[3] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 40227, Taiwan
[4] Asia Univ, Dept Photon & Commun Engn, Taichung, Taiwan
关键词
graphical password authentication; security; teganography; protocol;
D O I
10.2298/CSIS081223028L
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication, authorization and auditing are the most important issues of security on data communication. In particular, authentication is the life of every individual essential closest friend. The user authentication security is dependent on the strength of user password. A secure password is usually random, strange, very long and difficult to remember. For most users, remember these irregular passwords are very difficult. To easily remember and security are two sides of one coin. In this paper, we propose a new graphical password authentication protocol to solve this problem. Graphical password authentication technology is the use of click on the image to replace input some characters. The graphical user interface can help user easy to create and remember their secure passwords. However, in the graphical password system based on images can provide an alternative password, but too many images will be a large database to store issue. All the information can be steganography to achieve our scheme to solve the problem of database storage. Furthermore, tabular steganography technique can achieve our scheme to solve the information eavesdropping problem during data transmission. Our modified graphical password system can help user easily and friendly to memorize their password and without loss of any security of authentication. User's chosen input will be hidden into image using steganography technology, and will be transferred to server security without any hacker problem. And then, our authentication server only needs to store only a secret key for decryption instead of large password database.
引用
收藏
页码:823 / 841
页数:19
相关论文
共 50 条
  • [41] Bu-Dash: a universal and dynamic graphical password scheme (extended version)
    Andriotis, Panagiotis
    Kirby, Myles
    Takasu, Atsuhiro
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (02) : 381 - 401
  • [42] An Enhanced Capture Attacks Resistant Text-Based Graphical Password Scheme
    Ku, Wei-Chi
    Liao, Dum-Min
    Chang, Chia-Ju
    Qiu, Pei-Jia
    2014 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2014, : 204 - 208
  • [43] Deep learning based graphical password authentication approach against shoulder-surfing attacks
    Dias, Norman Ignatius
    Kumaresan, Mouleeswaran Singanallur
    Rajakumari, Reeja Sundaran
    MULTIAGENT AND GRID SYSTEMS, 2023, 19 (01) : 99 - 115
  • [44] An Entire Chaos-Based Biometric Remote User Authentication Scheme on Tokens Without Using Password
    Yoon, Eun-Jun
    Yoo, Kee-Young
    INFORMATICA, 2010, 21 (04) : 627 - 637
  • [45] A countable and time-bound password-based user authentication scheme for the applications of electronic commerce
    Lin, Iuon-Chang
    Chang, Chin-Chen
    INFORMATION SCIENCES, 2009, 179 (09) : 1269 - 1277
  • [46] Robust one-time password authentication scheme using smart card for home network environment
    Vaidya, Binod
    Park, Jong Hyuk
    Yeo, Sang-Soo
    Rodrigues, Joel J. P. C.
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 326 - 336
  • [47] An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy
    Qiu, Shuming
    Xu, Guoai
    Ahmad, Haseeb
    Guo, Yanhui
    PLOS ONE, 2018, 13 (03):
  • [48] Improvement of one-time password authentication scheme using smart cards
    Lee, NY
    Chen, JC
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (09) : 3765 - 3767
  • [49] A Reliably Dynamic User-Remote Password Authentication Scheme for Medical Environments
    Huang, Kuo-Kuang
    Wu, Zhen-Yu
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (05): : 995 - 1001
  • [50] Countermeasure on Password-Based Authentication Scheme for Multi-server Environments
    Lee, Youngsook
    Kim, Jiye
    Won, Dongho
    MULTIMEDIA AND UBIQUITOUS ENGINEERING, 2014, 308 : 459 - 466