Realtime Authentication using 3D Password

被引:0
|
作者
Chakraborty, Supriya [1 ]
Kundu, Rahul [1 ]
Paramanik, Saikat [1 ]
Kumari, Annu [2 ]
Mukherjee, Ushoshee [1 ]
机构
[1] Amity Univ Kolkata, AIITK, Kolkata, India
[2] Global Logo, Software Serv, Gurugram, India
关键词
Authentication; 3D password; Biometrics; Virtual Environment; Textual password; Multi-password;
D O I
10.1109/IPRECON55716.2022.10059508
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
The complex advancement of the computing world makes access to confidential information more vulnerable. The daily activities like banking, official back-office activities and etc. are performed completely online. The sustainable and successful practice for authentication is One Time Password. However, it needs end-user interaction and either internet or phone connection. In this regard, a new alternative scheme with less requirement of resources- 3D password is proposed that uses real-time features of end-users for accessing the confidential data/services. In this work, facial expression, eye-ball movement, and keyboard values are collated and normalize to form the 3D password and subsequently validated. The exhaustive experimental results exhibit around 80
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Realtime 3D profile measurement by using the composite pattern based on the binary stripe pattern
    Xu, Jing
    Gao, Bingtuan
    Han, Jinhua
    Zhao, Jianguo
    Liu, Shaoli
    Yi, Qiang
    Zhao, Zhengda
    Yin, Huabin
    Chen, Ken
    OPTICS AND LASER TECHNOLOGY, 2012, 44 (03): : 587 - 593
  • [42] Realtime 3D Object Detection for Automated Driving Using Stereo Vision and Semantic Information
    Koenigshofe, Hendrik
    Salscheider, Niels Ole
    Stiller, Christoph
    2019 IEEE INTELLIGENT TRANSPORTATION SYSTEMS CONFERENCE (ITSC), 2019, : 1405 - 1410
  • [43] CRYPTANALYSIS OF A PASSWORD AUTHENTICATION SCHEME USING QUADRATIC RESIDUES
    CHANG, CC
    WU, TC
    LAIH, CS
    COMPUTER COMMUNICATIONS, 1995, 18 (01) : 45 - 47
  • [44] An improved protocol for password authentication using smart cards
    Cheng, Zi-Yao
    Liu, Yun
    Chang, Chin-Chen
    Chang, Shih-Chang
    Journal of Computers, 2012, 22 (04): : 29 - 37
  • [45] Enhancement of Password Authentication System Using Graphical Images
    Bhand, Amol
    Desale, Vaibhav
    Shirke, Swati
    Pansambal , Suvarna
    2015 IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING (ICIP), 2015, : 217 - 219
  • [46] Analysis of Authentication on Online Purchase using Honey Password
    Sudramurthy, Balaji
    Al Obaidy, Mohaned
    Maata, Rolou Lyn R.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2017, : 850 - 852
  • [47] PASSWORD AUTHENTICATION USING PUBLIC-KEY CRYPTOGRAPHY
    HARN, L
    HUANG, D
    LAIH, CS
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1989, 18 (12) : 1001 - 1017
  • [48] Web Security Improving by using Dynamic Password Authentication
    Pansa, Detchasit
    Chomsiri, Thawatchai
    NETWORK AND ELECTRONICS ENGINEERING, 2011, 11 : 32 - 36
  • [49] Authentication System Using 3D Face With Algorithm DLT and Neural Network
    Nickvaldo, Leonardus Alexander
    Kusnadi, Adhi
    Wella
    Winantyo, Rangga
    Pane, Ivransa Zuhdi
    2018 JOINT 10TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND INTELLIGENT SYSTEMS (SCIS) AND 19TH INTERNATIONAL SYMPOSIUM ON ADVANCED INTELLIGENT SYSTEMS (ISIS), 2018, : 186 - 189
  • [50] Graphical password authentication using cued click points
    Chiasson, Sonia
    van Oorschot, P. C.
    Biddle, Robert
    COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 359 - +