Skip to main content

2020 | OriginalPaper | Buchkapitel

A Novel Hybrid User Authentication Scheme Using Cognitive Ambiguous Illusion Images

verfasst von : Sumaiya Dabeer, Mahira Ahmad, Mohammad Sarosh Umar, Muneeb Hasan Khan

Erschienen in: Data Communication and Networks

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Text-based passwords are most common and easy to use but are difficult to memorize and remember. Moreover, they are prone to attacks like shoulder surfing and brute-force. On the other hand, graphical passwords are easy to remember and memorize. But they are still not commonly used as they have some issues like increased user login time, and small password space. In today’s scenario where number of data breaches is increasing, more secure authentication schemes are needed to ensure the authenticity of a user. In this paper, we propose a novel hybrid user authentication scheme by integrating both text-based and graphical password schemes to make authentication system stronger and resistant to attacks. Our scheme has two steps of authentication, in which at the first step, the user has to recognize and select his appropriate image among the blurred images and in the next step, the user has to enter the tag associated with the selected image. Only after successful completion of the two steps, the user is authenticated. The images used as a part of graphical password scheme are cognitive ambiguous illusion images. The basic idea behind using these images is that they are perceived by different users differently depending on how they visualize the image. To evaluate the effectiveness of the proposed scheme, an experiment was conducted on the setup and the results obtained were promising.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat R. Dhamija, A. Perrig, (2000) Deja Vu-a user study: using images for authentication, in USENIX Security Symposium, vol. 9, pp. 4–4 R. Dhamija, A. Perrig, (2000) Deja Vu-a user study: using images for authentication, in USENIX Security Symposium, vol. 9, pp. 4–4
2.
Zurück zum Zitat E. Stobert, R. Biddle, Memory retrieval and graphical passwords, in Proceedings of the Ninth Symposium on Usable Privacy and Security (ACM, 2013), p. 15 E. Stobert, R. Biddle, Memory retrieval and graphical passwords, in Proceedings of the Ninth Symposium on Usable Privacy and Security (ACM, 2013), p. 15
3.
Zurück zum Zitat A.V. Kayem, (2016) Graphical passwords—a discussion, in 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA) (IEEE), pp. 596–600 A.V. Kayem, (2016) Graphical passwords—a discussion, in 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA) (IEEE), pp. 596–600
4.
Zurück zum Zitat E. Hayashi, R. Dhamija, N. Christin, A. Pering, Use your illusion: secure authentication usable anywhere, in Proceedings of the 4th Symposium on Usable Privacy and Security (ACM, 2008), pp. 35–45 E. Hayashi, R. Dhamija, N. Christin, A. Pering, Use your illusion: secure authentication usable anywhere, in Proceedings of the 4th Symposium on Usable Privacy and Security (ACM, 2008), pp. 35–45
5.
Zurück zum Zitat K.D.D.P. Prabhu, Image based authentication using illusion pin for shoulder surfing attack. Int. J. Pure Appl. Math. 119(7), 835–840 (2018) K.D.D.P. Prabhu, Image based authentication using illusion pin for shoulder surfing attack. Int. J. Pure Appl. Math. 119(7), 835–840 (2018)
6.
Zurück zum Zitat T. Zangooei, M. Mansoori, I. Welch, A hybrid recognition and recall based approach in graphical passwords, in Proceedings of the 24th Australian Computer-Human Interaction Conference (ACM, 2012), pp. 665–673 T. Zangooei, M. Mansoori, I. Welch, A hybrid recognition and recall based approach in graphical passwords, in Proceedings of the 24th Australian Computer-Human Interaction Conference (ACM, 2012), pp. 665–673
7.
Zurück zum Zitat L.T. Hui, H.K. Bashier, L.S. Hoe, G.K.O. Michael, W.K. Kwee, Conceptual framework for high-end graphical password, in 2014 2nd International Conference on Information and Communication Technology (ICoICT) (IEEE, 2014), pp. 64–68 L.T. Hui, H.K. Bashier, L.S. Hoe, G.K.O. Michael, W.K. Kwee, Conceptual framework for high-end graphical password, in 2014 2nd International Conference on Information and Communication Technology (ICoICT) (IEEE, 2014), pp. 64–68
8.
Zurück zum Zitat M.S. Umar, M.Q Rafiq, J.A. Ansari, Graphical user authentication: a time interval based approach, in 2012 IEEE International Conference on Signal Processing, Computing and Control (IEEE, 2012), pp. 1–6 M.S. Umar, M.Q Rafiq, J.A. Ansari, Graphical user authentication: a time interval based approach, in 2012 IEEE International Conference on Signal Processing, Computing and Control (IEEE, 2012), pp. 1–6
9.
Zurück zum Zitat S. Istyaq, M.S. Umar, Hybrid authentication scheme for graphical password using QR code and integrated sound signature. Int. J. Comput. Electr. Autom. Control Inf. Eng. 111–115 (2018) S. Istyaq, M.S. Umar, Hybrid authentication scheme for graphical password using QR code and integrated sound signature. Int. J. Comput. Electr. Autom. Control Inf. Eng. 111–115 (2018)
10.
Zurück zum Zitat M.S. Umar, M.Q. Rafiq, A graphical interface for user authentication on mobile phones, in ACHI 2011: The Fourth International Conference on Advances in Computer-Human Interactions (2011), pp. 69–74 M.S. Umar, M.Q. Rafiq, A graphical interface for user authentication on mobile phones, in ACHI 2011: The Fourth International Conference on Advances in Computer-Human Interactions (2011), pp. 69–74
11.
Zurück zum Zitat A. Usmani, A. Maryam, M.S. Umar, M.H. Khan, New text-based user authentication scheme using CAPTCHA, in Information and Communication Technology for Competitive Strategies (Springer, Singapore, 2019), pp. 313–322 A. Usmani, A. Maryam, M.S. Umar, M.H. Khan, New text-based user authentication scheme using CAPTCHA, in Information and Communication Technology for Competitive Strategies (Springer, Singapore, 2019), pp. 313–322
12.
Zurück zum Zitat S. Saeed, M.S. Umar, PassNeighbor: a shoulder surfing resistant scheme, in 2016 2nd International Conference on Next Generation Computing Technologies (NGCT) (IEEE, 2016), pp. 797–802 S. Saeed, M.S. Umar, PassNeighbor: a shoulder surfing resistant scheme, in 2016 2nd International Conference on Next Generation Computing Technologies (NGCT) (IEEE, 2016), pp. 797–802
13.
Zurück zum Zitat S. Agrawal, A.Z. Ansari, M.S. Umar, Multimedia graphical grid based text password authentication: for advanced users, in 2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN) (IEEE, 2016), pp. 1–5 S. Agrawal, A.Z. Ansari, M.S. Umar, Multimedia graphical grid based text password authentication: for advanced users, in 2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN) (IEEE, 2016), pp. 1–5
14.
Zurück zum Zitat Z. Zheng, X. Liu, L. Yin, Z. Liu, A hybrid password authentication scheme based on shape and text. JCP 5(5), 765–772 (2010) Z. Zheng, X. Liu, L. Yin, Z. Liu, A hybrid password authentication scheme based on shape and text. JCP 5(5), 765–772 (2010)
15.
Zurück zum Zitat R. Fatima, N. Siddiqui, M.S. Umar, M.H. Khan, A novel text-based user authentication scheme using pseudo-dynamic password, in Information and Communication Technology for Competitive Strategies (Springer, Singapore, 2019), pp. 177–186 R. Fatima, N. Siddiqui, M.S. Umar, M.H. Khan, A novel text-based user authentication scheme using pseudo-dynamic password, in Information and Communication Technology for Competitive Strategies (Springer, Singapore, 2019), pp. 177–186
16.
Zurück zum Zitat Z. Zaheer, A. Khan, M.S. Umar, M.H. Khan, One-tip secure: next-gen of text-based password, in Information and Communication Technology for Competitive Strategies (Springer, Singapore, 2019), pp. 235–243 Z. Zaheer, A. Khan, M.S. Umar, M.H. Khan, One-tip secure: next-gen of text-based password, in Information and Communication Technology for Competitive Strategies (Springer, Singapore, 2019), pp. 235–243
17.
Zurück zum Zitat M.H. Zaki, A. Husain, M.S. Umar, M.H. Khan, Secure pattern-key based password authentication scheme, in 2017 International Conference on Multimedia, Signal Processing and Communication Technologies (IMPACT) (IEEE, 2017), pp. 171–174 M.H. Zaki, A. Husain, M.S. Umar, M.H. Khan, Secure pattern-key based password authentication scheme, in 2017 International Conference on Multimedia, Signal Processing and Communication Technologies (IMPACT) (IEEE, 2017), pp. 171–174
18.
Zurück zum Zitat X. Yu, Z. Wang, Y. Li, L. Li, W.T. Zhu, L. Song, EvoPass: evolvable graphical password against shoulder-surfing attacks. Comput. Secur. 70, 179–198 (2017)CrossRef X. Yu, Z. Wang, Y. Li, L. Li, W.T. Zhu, L. Song, EvoPass: evolvable graphical password against shoulder-surfing attacks. Comput. Secur. 70, 179–198 (2017)CrossRef
19.
Zurück zum Zitat A. Danish, L. Sharma, H. Varshney, A.M. Khan, Alignment based graphical password authentication system, in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) (IEEE, 2016), pp. 2950–2954 A. Danish, L. Sharma, H. Varshney, A.M. Khan, Alignment based graphical password authentication system, in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) (IEEE, 2016), pp. 2950–2954
Metadaten
Titel
A Novel Hybrid User Authentication Scheme Using Cognitive Ambiguous Illusion Images
verfasst von
Sumaiya Dabeer
Mahira Ahmad
Mohammad Sarosh Umar
Muneeb Hasan Khan
Copyright-Jahr
2020
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-0132-6_8

Neuer Inhalt