International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 9 | Number 2 | Year 2014 | Article Id. IJCTT-V9P151 | DOI : https://doi.org/10.14445/22312803/IJCTT-V9P151

Securing Web Accounts Using Graphical Password Authentication through Watermarking


Vinit Khetani , Jennifer Nicholas , Anuja Bongirwar , Abhay Yeole

Citation :

Vinit Khetani , Jennifer Nicholas , Anuja Bongirwar , Abhay Yeole, "Securing Web Accounts Using Graphical Password Authentication through Watermarking," International Journal of Computer Trends and Technology (IJCTT), vol. 9, no. 2, pp. 269-274, 2014. Crossref, https://doi.org/10.14445/22312803/ IJCTT-V9P151

Abstract

Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user-friendly password-based method has been on the agenda of security researchers for a long time. On one hand, there are password manager programs which facilitate generating site-specific strong passwords from a single user password to eliminate the memory burden due to multiple passwords. On the other hand, there are studies exploring the viability of graphical passwords as a more secure and user-friendly alternative. In this project, we propose a new graphical password scheme for accessing web accounts called “Secure Web Account Access through Recognition Based Graphical Password by Watermarking”. Here user selects number of images as a password and while login user needs to enter the random code generated below each image, which has been set as a password. Here the security of the system is very high and every time user needs to enter different set of code for authentication i.e. every time new password gets generated making Dictionary attacks, Brute Force attack, and other attacks infeasible.

Keywords

Graphical Passwords, Authentication, Web Access through Graphical Password, Secure Web Access, Graphical User Authentication, Watermarking.

References

[1] R.Dhamija and A. Perrig. “Déjà Vu: A User Study Using Images for Authentication”. In 9th USENIX Security Symposium, 2000.
[2] Real User Corporation: Passfaces. www.passfaces.com
[3] Jermyn, I., Mayer A., Monrose, F., Reiter, M., and Rubin. “The design and analysis of graphical passwords” in Proceedings of USENIX Security Symposium, August 1999.
[4] Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang Liu Uwe Aickelin, "A New Graphical Password Scheme Resistant to Shoulder-Surfing"
[5] Kumar, M., et al., Reducing Shoulder-surfing by Using Gazebased Password Entry, in Symposium On Usable Privacy and Security (SOUPS). 2007: Pittsburgh, PA, USA.
[6] Zheng-ding, L.T.Q., The Survey of Digital Watermarkingbased Image Authentication Techniques, in IEEE, ICSPOP Proceedings. 2002.
[7] Zheng, D., Y. Liu, and J. Zhao, A Survey of RST Invariant Image Watermarking Algorithms, in IEEE CCECE/CCGEI, Ottawa, May. 2006.
[8] Luis P´erez-Freire, P.C.n., Juan Ram´on Troncoso-Pastoriza, and Fernando P´erez-Gonz´ale, Watermarking Security: A Survey. Springer-Verlag Berlin Heidelberg, 2006.
[9] Gao, H., et al., Analysis and Evaluation of the ColorLogin Graphical Password Scheme, in Fifth International Conference on Image and Graphics(ICIG). 2009, IEEE. p. 722 - 727
[10] Lashkari, A.H., et al., Shoulder Surfing attack in graphical password authentication. International Journal of Computer Science and Information Security, 2009. 6(9).
[11] Biddle, R., S. Chiasson, and P.C.v. Oorschot, Graphical Passwords: Learning from the First Generation. 2009: Ottawa, Canada.
[12] Dunphy, P., J. Nicholson, and P. Olivier, Securing Passfaces for Description. 2008.
[13] Sandouka, H., A. Cullen, and I. Mann, Social Engineering Detection using Neural Networks, in 2009 International Conference on CyberWorlds 2009, IEEE.
[14] al, A.A.G.e., Network Attacks, in Network Intrusion Detection and Prevention: Concepts and Techniques, Springer Science, Business Media.