Hybrid Authentication Scheme for Graphical Password Using QR Code and Integrated Sound Signature
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Hybrid Authentication Scheme for Graphical Password Using QR Code and Integrated Sound Signature

Authors: Salim Istyaq, Mohammad Sarosh Umar

Abstract:

Today, the mankind is in the stage of development, every day comes with new proposal of technology, in order to secure these types of technology, we also prepare high yielding security modules to conserve these resources. The capacity of human brain to recognize anything is far more than any species; this is all due to our developing cycle of curiosity. In this paper, we proposed a scheme based on graphical password using QR Code which provides more security to the recent online system. It also contains a supportive sound signature. In this system, authentication is done using sequence of images in QR code form. Users select one click-point per image with the help of QR scanner or recognizer. The encoded phrase in a QR code emphasizes the minimum probability of attacking via shoulder surfing or other attacks.

Keywords: Graphical password, QR code, sound signature, image authentication, cued click point.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1316728

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 774

References:


[1] William Stallings and Lawrie Brown. “Computer Security: Principle and Practices." Pearson Education, 2008.
[2] Authentication: http://www.objs.com/survey/authent.htm.
[3] Mohd. Sarosh Umar and Mohd Qasim Rafiq, “A Graphical Interface for User Authentication on Mobile Phones”, in ACHI 2011: The Fourth International Conference on Advances in Computer-Human Interactions, Guadeloupe, France, February 23-28, 2011.
[4] L. Sobrado and J.C. Birget, “Graphical Passwords”, The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research, vol 4, 2002,http://rutgersscholar.rutgers.edu/volume04/sobrbirg/sobrbirg.htm.
[5] Patric Elftmann, Diploma Thesis, “Secure Alternatives to Password-Based Authentication Mechanisms” Aachen, Germany October 2006.
[6] Xiayuan Suo, Ying Zhu, and G. Scott. Owen, “Graphical Passwords: A Survey”, In Proceedings of Annual Computer Security Applications Conference, 2005.
[7] Mr. Pratik, A Vanjara and Dr. Kishor Atkotiya, Analysis &Design ‘Graphical Password Authentication Using Cryptography Algorithms’ Volume: 1 | Issue: 9 | September 2012 ISSN - 2250-1991.
[8] G. E. Blonder, "Graphical passwords," in Lucent Technologies, Inc., Murray Hill, NJ, U. S. Patent, Ed. United States, 1996.
[9] W. Jansen, "Authenticating Mobile Device User through Image Selection," in Data Security, 2004.
[10] W. Jansen, "Authenticating Users on Handheld Devices “in Proceedings of Canadian Information Technology Security Symposium, 2003.
[11] Passfaces Corporation. The science behind Passfaces, White paper, http://www.passfaces.com/enterprise/resources/white_papers.htm.
[12] A. F. Syukri, E. Okamoto, and M. Mambo, "A User Identification System Using Signature Written with Mouse", In Third Australasian Conference on Information Security and Privacy (ACISP): Springer Verlag Lecture Notes in Computer Science (1438), 1998, pp. 403-441.
[13] Rachna Dhamija and Adrian Perrig, “Deja Vu: A User Study. Using Images for Authentication” in Proceedings of the 9th USENIX Security Symposium, August 2000.
[14] Salim Istyaq, “Hybrid Authentication System Using QR Code with OTP”, in International Journal of Computer, Electrical, Automation, Control and Information Engineering (World Academy of Science, Engineering and Technology), Vol: 10, No:6, 2016, PP. 1194-1197.
[15] Mohammad Sarosh Umar and Mohammad Qasim Rafiq, “A Novel Graphical Interface for User Authentication on Mobile Phones and Handheld Devices”, International Journal On Advances in Intelligent Systems, volume 4, numbers 3 and 4, pp 380 to 387, 2011 (IARIA Journals) Publication Date April 30, 2012.
[16] Salim Istyaq and M. Sarosh Umar, “Encoding Passwords Using QR Image for Authentication”, 2ndInternational Conference on Next Generation Computing Technologies(NGCT-2016), Dehradun, India, 14-16 October, 2016, 978-1-5090-3256-3/16/$31.00 ©2016 IEEE.
[17] Brostoff, S., Sasse, M.A., 2000. Are Passfaces more usable than passwords: a field trial investigation? In: