Securing Web Accounts Using Graphical Password Authentication through Watermarking

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2014 by IJCTT Journal
Volume-9 Number-6                          
Year of Publication : 2014
Authors : Vinit Khetani , Jennifer Nicholas , Anuja Bongirwar , Abhay Yeole
DOI :  10.14445/22312803/IJCTT-V9P151

MLA

Vinit Khetani , Jennifer Nicholas , Anuja Bongirwar , Abhay Yeole."Securing Web Accounts Using Graphical Password Authentication through Watermarking". International Journal of Computer Trends and Technology (IJCTT) V9(6):269-274, March 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user-friendly password-based method has been on the agenda of security researchers for a long time. On one hand, there are password manager programs which facilitate generating site-specific strong passwords from a single user password to eliminate the memory burden due to multiple passwords. On the other hand, there are studies exploring the viability of graphical passwords as a more secure and user-friendly alternative. In this project, we propose a new graphical password scheme for accessing web accounts called “Secure Web Account Access through Recognition Based Graphical Password by Watermarking”. Here user selects number of images as a password and while login user needs to enter the random code generated below each image, which has been set as a password. Here the security of the system is very high and every time user needs to enter different set of code for authentication i.e. every time new password gets generated making Dictionary attacks, Brute Force attack, and other attacks infeasible.

References
[1] R.Dhamija and A. Perrig. “Déjà Vu: A User Study Using Images for Authentication”. In 9th USENIX Security Symposium, 2000.
[2] Real User Corporation: Passfaces. www.passfaces.com
[3] Jermyn, I., Mayer A., Monrose, F., Reiter, M., and Rubin. “The design and analysis of graphical passwords” in Proceedings of USENIX Security Symposium, August 1999.
[4] Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang Liu Uwe Aickelin, "A New Graphical Password Scheme Resistant to Shoulder-Surfing"
[5] Kumar, M., et al., Reducing Shoulder-surfing by Using Gaze-based Password Entry, in Symposium On Usable Privacy and Security (SOUPS). 2007: Pittsburgh, PA, USA.
[6] Zheng-ding, L.T.Q., The Survey of Digital Watermarkingbased Image Authentication Techniques, in IEEE, ICSPOP Proceedings. 2002.
[7] Zheng, D., Y. Liu, and J. Zhao, A Survey of RST Invariant Image Watermarking Algorithms, in IEEE CCECE/CCGEI, Ottawa, May. 2006.
[8] Luis P´erez-Freire, P.C.n., Juan Ram´on Troncoso-Pastoriza, and Fernando P´erez-Gonz´ale, Watermarking Security: A Survey. Springer-Verlag Berlin Heidelberg, 2006.
[9] Gao, H., et al., Analysis and Evaluation of the ColorLogin Graphical Password Scheme, in Fifth International Conference on Image and Graphics(ICIG). 2009, IEEE. p. 722 - 727
[10] Lashkari, A.H., et al., Shoulder Surfing attack in graphical password authentication. International Journal of Computer Science and Information Security, 2009. 6(9).
[11] Biddle, R., S. Chiasson, and P.C.v. Oorschot, Graphical Passwords: Learning from the First Generation. 2009: Ottawa, Canada.
[12] Dunphy, P., J. Nicholson, and P. Olivier, Securing Passfaces for Description. 2008.
[13] Sandouka, H., A. Cullen, and I. Mann, Social Engineering Detection using Neural Networks, in 2009 International Conference on CyberWorlds 2009, IEEE.
[14] al, A.A.G.e., Network Attacks, in Network Intrusion Detection and Prevention: Concepts and Techniques, Springer Science, Business Media.

Keywords
Graphical Passwords, Authentication, Web Access through Graphical Password, Secure Web Access, Graphical User Authentication, Watermarking.