Pass-Image Authentication Method Tolerant to Video-Recording Attacks
|
|
|
- Randell Harris
- 10 years ago
- Views:
Transcription
1 Proceedings of the Federated Conference on Computer Science and Information Systems pp ISBN Pass-Image Authentication Method Tolerant to Video-Recording Attacks Yutaka Hirakawa Shibaura Institute of Technology 3-7-5, Toyosu, Koto-ku, Tokyo, Japan Motohiro Take Shibaura Institute of Technology 3-7-5, Toyosu, Koto-ku, Tokyo, Japan Kazuo Ohzeki Shibaura Institute of Technology 3-7-5, Toyosu, Koto-ku, Tokyo, Japan Abstract User authentication is widely used in automatic teller machines (ATMs) and Internet services. Recently, ATM passwords have been increasingly stolen using small chargecoupled device cameras. This article discusses a user authentication method in which graphical passwords instead of alphabetic ones are used as passwords in order for it to be tolerant to observation attacks. Several techniques for password authentications have been discussed in various studies. However, there has not been sufficient research on authentication methods that use pass-images instead of pass-texts. This article proposes a user authentication method that is tolerant to attacks when a user s pass-image selection operation is video recorded twice. In addition, usage guidelines recommending eight pass-images are proposed, and its security is evaluated. U I. INTRODUCTION ser authentication is widely used in automatic teller machines (ATMs) and many Internet services. A four-digit personal identification number (PIN) or a textual password is commonly used for user authentication. In Japan in October 2005, an ATM password was stolen using a wireless chargecoupled device (CCD) camera recording. The criminal group had set up many cameras at various ATMs in Tokyo. The bank s investigation revealed that user operation was captured by hidden cameras at more than 60 ATMs in the metropolitan area [1][2]. Biometric authentication technology and sneak shot camera detection technology are possible solutions [3][4][5][6] to this problem. However, because there are many ATMs installed around the world and the aforementioned solutions require additional equipment, the problem is still not solved. In this article, we discuss an authentication method that uses pass-images instead of a textual password. In Japan, alphabetic characters are commonly used as authentication passwords for Internet services. However, alphabetic characters are not so familiar to elderly and younger people. Thus, authentication using pass-images might become a widely accepted method. In addition, this article discusses an authentication method that is tolerant to video-recording attacks. The security of the proposed authentication method is evaluated against random and video-recording attacks. The remainder of this article is organized as follows: Chapter II describes the requirements of the pass-image authentication method. Chapter III briefs the existing techniques. Chapter IV explains the proposed authentication method and Chapter V reports its security evaluation. Chapter VI discusses the usability of the method. Chapter VII describes the usage guidelines and Chapter VIII summarizes the article. II. REQUIREMENTS We assume the use of pass-images at ATMs. The security of the authentication method is evaluated from the following two viewpoints: (1) Random attack This is an attack that attempts to pass the authentication process by random operation. Because a four-digit PIN is used at ATMs, we adopt a success rate of less than 1/10000 as a requirement for a random attack. (2) Video-recording attack Currently, many cell phones and handheld devices are equipped with a camera. In addition, wireless CCD cameras are inexpensive. Therefore, the risk of sneaking a shot is increasing. At an ATM, password authentication may be conducted more than once; for example, in the case of multiple bank transfers. Therefore, we should be concerned about multiple video recordings of the pass-image selection operation. The success rate of video-recording attacks is not standardised. However, because the success rate of a random attack is 1/10000, we adopt the same for a video-recording attack. III. RELATED WORK Few studies on the authentication methods that use passtexts have discussed observation attacks [7][8][9][10][11] [12]. In [7], a password authentication technique called PIN Entry, which uses numeric key entry, is proposed. On the display, a white or black background is randomly shown. A user does not designate a password, but selects white or black as the password s background colour. To enter a password entry of one digit, a user designates the background colour by a different colour pattern four times. This method is safe against shoulder surfing; however, if the input operation is video recorded, the password can be easily discovered. In [8], an interface for the textual password called S3PAS is proposed. Many characters are displayed on the interface. A user designates three points where a pass-character is in /$25.00 c 2011 IEEE 767
2 768 PROCEEDINGS OF THE FEDCSIS. SZCZECIN, 2011 cluded in the triangle. This method is also safe against shoulder surfing; however, if the input operation is video recorded, the password can be easily discovered. In [9] and [10], an authentication method called fake- Pointer is proposed, which uses numeric key entry. In this method, a disposable answer selection information must be retrieved before each authentication. This answer selection information specifies a background mark such as a diamond, square, circle, or octagon for the displayed numeric password. At the time of authentication, a user presses the enter button that adjusts the password according to the background mark. If the answer selection information can be safely retrieved before each authentication, it is tolerant to videorecording attacks by recording twice. However, the studies do not discuss how to safely retrieve the information. A textual password entry interface called mobile authentication is proposed in [11]. In this method, all the selectable texts are arranged in a square. Each text has a background colour. Each password is alphanumeric, and the texts are arranged in a 10 5 square in which 10 colours are used. Each colour appears only once in each row. The colour pattern of a row is the permutated colour pattern of another row. In this method, a user provides a password and the correct background colours beforehand. During password entry, the user changes the background colour of a passcharacter until it matches the correct background colour, and then presses the enter button. Although this technique has the restriction that all available texts must be displayed on the authentication interface, it is secure against video-recording attacks by recording twice. Next, we review the methods in which pass-images instead of textual passwords are used. In [13], a method called Déjà vu is proposed. In this method, a user selects five pass-images beforehand from numerous images produced by the computer. During authentication, a user selects a pass-image from 25 images displayed on the screen. Because a mechanically produced image is difficult for a user to memorize, [14] proposes the use of facial images as pass-images. The techniques described in [13] and [14] are not safe against shoulder surfing because a user specifies a passimage using a keyboard or mouse. In [15], a method using graphical passwords is proposed. This method is similar to that described in [8]. This method is ambiguous, and security evaluation against shoulder surfing is not sufficient. In the AWASE-E method [16], 25 images including one correct pass-image are displayed on the screen similar to those described in the methods in [13] and [14]; however, this method also allows the display of a screen on which no pass-image is present. If the pass-image is not present on the screen, a user must select the no pass-image button. Although this technique is highly ambiguous, its security against sneaking a shot is not sufficient. Thus, there is no report on a pass-image authentication method tolerant to video-recording attacks where user operations are video recorded multiple times. IV. PROPOSED AUTHENTICATION METHOD A. Requirements for authentication interface An authentication method is expected to be tolerant to video-recording attacks. Although a user s selection operation of pass-images is video recorded, many pass-image candidates must exist when an attacker analyses the recorded video. To this end, providing secret information beforehand, such as correct position of each pass-image in the interface, is one solution, which is analogous to the technique used in [11]. However, it increases the amount of information that a user needs to memorize. Thus, an authentication method must satisfy the following requirements: It should have sufficient ambiguity in pass-image selection operation in case the operation is video recorded and analysed. Any additional information except pass-images should not be asked beforehand. B. Authentication interface When the password is ffchopin, it is an example of 8- length alphabetic password. Each character is chosen from 26 alphabetic characters. In this article, pass-images are used instead of characters. We assume there are N different images. And each pass-image is chosen from these N images. The password generally consists of number of pass-images. When the password is composed of eight pass-images, we use the description that the length of pass-images is eight. We use L to indicate the length of pass-images. We proposed the authentication interface shown in Fig. 1. In the authentication interface, depth (D) width (W) images are randomly selected and displayed. display A display example with 4 7 images Fig. 1 Authentication Interface For authentication operation, a user presses the following: Move button If a pass-image is displayed and a user wants to move it, a user uses the arrow button to move the image. Flash button
3 HIRAKAWA YUTAKA, HIROYUKI TAKE, KAZUO OHZEKI: PASS-IMAGE AUTHENTICATION METHOD TOLERANT TO VIDEO-RECORDING ATTACKS 769 If no pass-image is displayed, a user presses the flash button to redisplay a new set of images. Selection button If a pass-image is suitably positioned, a user presses the selection button. The system then shows a new display for the next pass-image selection. The selection operation should be done for each pass-image. When the password is composed of L pass-images, the selection operation is repeated L times. C. Row restriction of each pass-image In this article, we restrict each pass-image location in the authentication operation assuming the number of rows in the interface to be four. Following are the rules: The first pass-image is located at any place on the display. Assume that a user presses the selection button placing the first pass-image in the d 1-th row on the display. For the k-th (k 4) pass-image, a user can press the selection button placing the k-th pass-image in the d k-th row, where d k is not equal to d 1, d 2,,d k- 1. For the k-th (k > 4) pass-image, a user must press the selection button placing the pass-image in the d k 4-th row. The authentication system judges that a user is the authentic user when each L pass-image on the interface follows the aforementioned rules. These rules are intended to make the method tolerant to random attacks while satisfying the requirements for the authentication interface. In addition, the aforementioned row restriction does not increase the amount of information that a user needs to memorize. The position of each pass-image is not recorded beforehand. A user selects suitable pass-image positions freely, following the aforementioned rules. Figs. 2, 3 and 4 show success probabilities of random attacks. Each value is a mean value of the simulation conducted one million times. Fig. 2 Success probability of random attacks (L = 7) Fig. 3 Success probability of random attacks (L = 8) V. SECURITY EVALUATION There are different ways to consider authentication using the pass-images. If L pass-images are selected using a user s favourite story, the order of the pass-image is important and each pass-image has its own order. If the user selects his/her favourite L pictures randomly, the order of the pass-images is not important. In evaluation, we assume the following two schemes: Ordered pass-image The number of the pass-images is L. A user selects L pass-images and a sequence of pass-images is registered beforehand. The authentication must be achieved using the registered pass-image sequence. Non-ordered pass-image A user selects and registers L pass-images beforehand. A user can select L pass-images in random order. The authentication must be achieved L times with each different passimage. A. Security against random attacks (1) Ordered pass-image We assume that each pass-image is chosen from N different images. If N is large enough, the success probability of random attack is very small. Fig. 4 Success probability of random attacks (L = 9) The number of columns in the authentication interface and the pass-image length vary in the evaluation. The number of rows in the interface is fixed to four. When the number of columns increases, the number of images on the display also increases, thus increasing the success probability of random attacks. A safe range of the number of columns against random attacks is summarized in Table I. In the table, each value is the maximum number of columns in which the success probability of random attacks does not exceed 1/ TABLE I. SAFETY RANGE OF COLUMNS N = 160 ~25 ~29 ~35 N = 140 ~20 ~25 ~29 N = 120 ~19 ~22 ~24 N = 100 ~15 ~18 ~20
4 770 PROCEEDINGS OF THE FEDCSIS. SZCZECIN, 2011 (2) Non-ordered pass-image Figs. 5, 6 and 7 show success probabilities of random attacks. Each value is also a mean value of the simulation conducted one million times. Fig. 5 Success probability of random attacks (L = 7) Fig. 6 Success probability of random attacks (L = 8) Fig. 7 Success probability of random attacks (L = 9) The safe range of the number of columns in the authentication interface against random attacks is summarized in Table II. In the table, each value is the maximum number of columns in which the success probability of random attacks does not exceed 1/ TABLE II. N = 160 ~8 ~9 ~10 N = 140 ~7 ~8 ~8 N = 120 ~6 ~6 ~7 N = 100 ~5 ~5 ~6 B. Video-recording attacks Video-recording attack is very serious; attackers record users password input operation by using video cameras. In addition, multiple authentication operations are assumed to be recorded. As the first step, we assume that two different authentication operations are recorded in this article. We denote them as s 11, s 12,, s 1L and s 21, s 22,, s 2L, where L is the length of the pass-image sequence. For example, these authentication operations could be recorded yesterday and today, respectively, and s 12 would indicate the screen shot of yesterday s second pass-image selection. Attackers analyse videos and attempt to obtain the passimages as follows: (1) Ordered pass-images When ordered pass-images are used, the first pass-image must appear in the first authentication. Let the shots of the authentication interface in the first pass-image selection of each authentication be s 11 and s 21. In both the shots, the first pass-image must appear. Similarly, the second pass-image must be included in both s 12 and s 22. In this way, attackers analyse video and attempt to obtain the pass-images. If a sequence of the images follows the following conditions, it is a possible pass-image candidate: 1) The sequence of the pass-images consists of L images. It is described as c 1, c 2,, c L. 2) The correct pass-image c k must appear in both s 1k and s 2k. 3) For each image involved in the sequence of the passimages, row restriction is satisfied for the first and second set of operations. Through the aforementioned analysis, attackers obtained several ordered pass-image sequences whose length is L. When attackers attempt to obtain the correct sequence of the pass-images, they use each possible pass-image sequence. Thus, it is considered to satisfy the requirements described in Chapter II when more than possible pass-image sequences exist. (2) Non-ordered pass-images When non-ordered pass-images are used, a candidate for the pass-image sequence must satisfy the following conditions: 1) The sequence of the pass-images consists of L images. It is described as c 1,c 2,,c L. 2) When image c 1,c 2,,c L appears in s 11,s 12,,s 1L in this order, image c 1,c 2,,c L must appear in s 21,s 22,,s 2L in the order where c 1,c 2,,c L is a permutation of c 1,c 2,,c L. 3) For each image involved in c 1,c 2,,c L, row restriction is satisfied for the first set of operations s 11,s 12,,s 1L. In addition, for each image involved in c 1,c 2,,c L, row restriction is satisfied for the second set of operations s 21,s 22,,s 2L. Through the aforementioned analysis, attackers obtain several ordered pass-image sequences whose length is L. When attackers attempt to obtain the correct sequence of the pass-images, they use each possible pass-image sequence.
5 HIRAKAWA YUTAKA, HIROYUKI TAKE, KAZUO OHZEKI: PASS-IMAGE AUTHENTICATION METHOD TOLERANT TO VIDEO-RECORDING ATTACKS 771 However, assuming two different pass-image sequences c 1, c 2,, c L and c 1, c 2,, c L, where c 1,c 2,,c L is a permutation of c 1,c 2,,c L, when it is clarified that c 1, c 2,, c L is not a correct sequence of the pass-images, attackers need not try with c 1,c 2,,c L, because the order of the pass-images is not important in this case, and c 1,c 2,,c L is not a correct sequence of the pass-images. Thus, it is considered to satisfy the requirements described in Chapter IV when more than possible pass-image candidates exist. C. Security against video-recording attacks (1) Security evaluation for ordered pass-images Figs. 8, 9 and 10 show the number of the pass-image candidates obtained through video analysis. Each value is a mean value of the simulation conducted 100 times. TABLE III. N = ~ 16~ 16~ N = ~ 15~ 16~ N = ~ 14~ 14~ N = ~ 14~ 13~ (2) Security evaluation for non-ordered pass-images Figs. 11, 12 and 13 show the number of the pass-image candidates obtained through video analysis. Each value is a mean value of the simulation conducted 100 times. Fig. 8 Number of pass-image candidates (L = 7) Fig. 11 Number of set of pass-image candidates (L = 7) Fig. 9 Number of pass-image candidates (L = 8) Fig. 12 Number of set of pass-image candidates (L = 8) Fig. 10 Number of pass-image candidates (L = 9) The results are briefly summarized in Table III. For example, when the pass-image length is eight and the total number of images is 160, 16 or more columns are required in the authentication interface for the method to be tolerant to videorecording attacks. Fig. 13 Number of set of pass-image candidates (L = 9) The results are summarized in Table IV. For example, when the pass-image length is eight and the total number of images is 160, eight or more columns are required in the authentication interface for the method to be tolerant to videorecording attacks.
6 772 PROCEEDINGS OF THE FEDCSIS. SZCZECIN, 2011 TABLE IV. N = 160 9~ 8~ 8~ N = 140 9~ 8~ 7~ N = 120 8~ 7~ 7~ N = 100 7~ 7~ 6~ D. Security against both attacks and discussion The range of columns in the authentication interface for the method to be tolerant to both types of attacks is shown in Tables V and VI. TABLE V. (ORDERED PASS-IMAGES) N = ~ ~ ~ 35 N = ~ ~ ~ 29 N = ~ ~ ~ 24 N = ~ ~ ~ 20 TABLE VI. (NON-ORDERED PASS-IMAGES) N=160-8 ~ 9 8 ~ 10 N= ~ 8 N= N= The values in Table V are higher than those in Table VI, which implies that authentication with ordered pass-images requires many columns in the interface for the method to be tolerant to video-recording attacks. Many columns indicate a wide interface that is considered unsuitable for use. Authentication with non-ordered pass-images is considered to be superior to that with ordered pass-images in terms of the interface. VI. USABILITY OF THE METHOD In this section, we evaluate and discuss the usability of the proposed pass-image authentication method. We prepared several photo images in eight categories, which included photographs of animals, scenery, vehicles and food. We asked our colleagues to use the authentication method. We faced a difficulty when some colleagues found selecting and memorizing eight images to be a difficult task. If photographs captured by each user are used as pass-images, memorizing them is much easier; but it is known that there is a problem in security because it is possible to narrow down the pass-image candidates paying attention with photographer s preference and conditions of taking photographs. Another solution is to memorize the images by using a story. However, this was ruled out in the discussion of the evaluation results in this article. We attempt to solve this problem in the following section. VII. USAGE GUIDELINES Considering the suggestions of our colleagues, we introduced usage guidelines for the proposed method summarized as follows: The length of the pass-image sequence is eight pass-images. Four category images are used for authentication. A user selects two pass-images in each category. For authentication, two pass-images in the same category are continuously used. Thus, 2k-th and (2k + 1)-th pass-images must fall in the same category. Row restriction for the pass-images must be satisfied. These usage guidelines are rather easy to follow; however, whether the authentication method following these guidelines is tolerant to both types of attacks is unclear. We assume that attackers have the same information as normal users; for example, they know the correct category of each image. The results of security evaluation are shown in Table VII. It shows a safe range of columns in the authentication interface. TABLE VII. Success Number of Number of rate of operations columns pass-image random per one selection candidates attacks ( 10 6 ) N = N = N = N = In the table, the average button operation frequency is shown on the right. In [19], keystrokes per character (KSPC) on a mobile terminal are discussed and the operation frequency is considered as a measure to evaluate the user interface.
7 HIRAKAWA YUTAKA, HIROYUKI TAKE, KAZUO OHZEKI: PASS-IMAGE AUTHENTICATION METHOD TOLERANT TO VIDEO-RECORDING ATTACKS 773 For example, when 100 images are used (25 images for each category), authentication is tolerant to both random and video-recording attacks in the case of a 9- or 10-column and 4-row interface. Also, the value of KSPC is relatively small and easy to use. Conventionally, there is no authentication method which satisfies followings: The authentication method, that uses pass-images instead of textual password, is tolerant to random and videorecording attacks even if the operation is video recorded twice. Any additional information except pass-images should not be registered beforehand. In a case of other method, sometimes users are required to memorize additional information, such as the correct place in the interface for each pass-image or pass-text. A user s authentication operation must be satisfied the row restriction described in Chapter IV. But it may be described in the authentication interface for user s help. It is no need to memorize it. In this article, we use random selection and describe statistical data. In the case where N = 100 and 4-row 10-column display is used in the authentication interface, the average number of pass-image candidates is , where the standard deviation is Assuming the values as normally distributed, a 95% confidence interval is ± the mean value. A 99% confidence interval is ± mean value. VIII. CONCLUSION This article proposed a user authentication method that uses pass-images instead of textual password. Fundamental characteristics of the authentication method are clarified, and the proposed authentication method is shown to be tolerant to random and video-recording attacks even if the operation is video recorded twice. The method does not require a user to register additional information except pass-images. In the discussion of usability, usage guidelines for eight pass-images are proposed. In addition, it is shown to be tolerant to both random and video-recording attacks when authentication is used in accordance with the guidelines. REFERENCES [1] The Mitsubishi Tokyo UFJ bank, A bank report about that the camera was put on secretly at the ATM machine by some person. [2] Bank of Yokohama, A bank report about that equipment for the sneak shot was installed in the unmanned agency (the ATM out of the store). [3] M. Une, T. Matsumoto, About the fragilitas about the living body authentication: It studies mainly a fragilitas about the counterfeiting of a stigma by the finance, vol.24, no.2, pp (2005) [4] Banno, The recent trend, the forensic science technology of the living body authentication technology, vol.12, no.1, pp.1-12 (2007) [5] Secom Co., Ltd., It begins the ATM sneak shot damage prevention service by the offer html [6] NEC, The service of the investigation of the detectaphone and the sneak shot receptacle [7] V. Roth, K. Richter, R. Freidinger, A Pin-Entry Method Resilient Against Shoulder Surfing, CCS 04, pp (Oct 2004) [8] H. Zhao, X. Li, S3PAS: A Scalable Shoulder-Surfing Resistant Textual-graphical Password Authentication Scheme, IEEE Advanced Information Networking and Applications Workshops 2007, pp (2007) [9] T. Takada, fakepointer: The authentication technique which has tolerance to video recording attacks, IPSJ transaction, vol.49, no.9, pp (Sep 2008) [10] T. Takada, fakepointer2: The proposal of the user interface to improve safety to the peep attack about the individual authentication, Cryptography and Information Security Symposium, SCIS2007 (2007) [11] Sakurai, Yoshida, Bunaka, Mobile authentication method, Computer Security Symposium 2004, pp (Oct 2004) [12] X. Suo, Y. Zhu, G. S. Owen, Graphical Passwords: A Survey, 21 st Annual Computer Security Applications Conference, ACSAC 2005 (2005) [13] R. Dhamija and A. Perrig, Déjà vu: A User Study Using Images for Authentication, 9 th Usenix Security Symposium, pp (Aug, 2000) [14] RealUser: [15] L. Sobrado, J. Birget, Graphical passwords, The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research, vol. 4 (2002) [16] T. Takada, H. Koike, Awase-E: Image-Based Authentication for Mobile Phones Using User s Favorite Images, LNCS2795. Human-Computer Interaction with Mobile Devices and Services, pp (2003) [17] T. Pering, M. Sundar, J. Light, R. Want, Photographic Authentication through Untrusted Terminals, IEEE Pervasive Computing, vol.2, no.1, pp (2003) [18] W. Ku, M. Tsaur, A Remote User Authentication Scheme Using Strong Graphical Passwords, IEEE Local Computer Networks, LCN 05 (2005) [19] I. S. MacKenzie, KSPC (keystrokes per Characters) as a Characteristic of Text Entry Techniques, Proc. Mobile HCI 02, LNCS-2411, Berlin, pp , Springer- Verlag (2002)
PASS-IMAGE AUTHENTICATION METHOD TOLERANT TO RANDOM AND VIDEO-RECORDING ATTACKS
International Journal of Computer Science and Applications Technomathematics Research Foundation Vol. 9, No. 3, pp. 20 36, 2012 PASS-IMAGE AUTHENTICATION METHOD TOLERANT TO RANDOM AND VIDEO-RECORDING ATTACKS
Universal Multi-Factor Authentication Using Graphical Passwords
Universal Multi-Factor Authentication Using Graphical Passwords Alireza Pirayesh Sabzevar, Angelos Stavrou Computer Science Department, George Mason University, Fairfax, Virginia, 22030 {apirayes, astavrou}@gmu.edu
Awase-E: Image-based Authentication for Mobile Phones using User s Favorite Images
Awase-E: Image-based Authentication for Mobile Phones using User s Favorite Images Tetsuji TAKADA 1 and Hideki KOIKE 2 1 SONY Computer Science Laboratories Muse Bldg. 3-14-13 Higashigotanda, Shinagawa-ku,
One Time Password Generation for Multifactor Authentication using Graphical Password
One Time Password Generation for Multifactor Authentication using Graphical Password Nilesh B. Khankari 1, Prof. G.V. Kale 2 1,2 Department of Computer Engineering, Pune Institute of Computer Technology,
A secure email login system using virtual password
A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {[email protected]} 2 SVNIT, Surat,Gujarat,India 2 {[email protected]}
Securing ATM Using Graphical Password Authentication Scheme
Securing ATM Using Graphical Password Authentication Scheme Sonia Rathi 1, Raunak Chitnis 2, Ramakant Yadav 3, Mrs. M.V.Bhosle 4 1 (Department Of Information Technology, Marathwada Mitra Mandal s Institute
3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India
3D PASSWORD Tejal Kognule Yugandhara Thumbre Snehal Kognule ABSTRACT 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human
(IT Journal of Research, Volume 1, May 2010 SECUREZZA. Prof. Gauri Rao, Lecturer Bharati Vidyapeeth College of Engineering, Pune.
SECUREZZA Prof. Gauri Rao, Lecturer Bharati Vidyapeeth College of Engineering, Pune Abstract The current security systems and authentication systems have much weakness and are prone to break through. Textual
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department
Integration of Sound Signature in 3D Password Authentication System
Integration of Sound Signature in 3D Password Authentication System Mr.Jaywant N. Khedkar 1, Ms.Pragati P. Katalkar 2, Ms.Shalini V. Pathak 3, Mrs.Rohini V.Agawane 4 1, 2, 3 Student, Dept. of Computer
SECUDROID - A Secured Authentication in Android Phones Using 3D Password
SECUDROID - A Secured Authentication in Android Phones Using 3D Password Ms. Chandra Prabha K M.E. Ph.D. 1, Mohamed Nowfel 2 E S, Jr., Gowtham V 3, Dhinakaran V 4 1, 2, 3, 4 Department of CSE, K.S.Rangasamy
Feasibility Study of Implementation of Cell Phone Controlled, Password Protected Door Locking System
Feasibility Study of Implementation of Cell Phone Controlled, Password Protected Door Locking System Ashish Jadhav 1, Mahesh Kumbhar 2, Mahesh Walunjkar 3 Lecturer, Dept. of Electronics and Telecommunication,
Vishal Kolhe, Vipul Gunjal, Sayali Kalasakar, Pranjal Rathod Department of Computer Engineering, Amrutvahini Collage of Engineering, Sangamner
Secure Authentication with 3D Password Vishal Kolhe, Vipul Gunjal, Sayali Kalasakar, Pranjal Rathod Department of Computer Engineering, Amrutvahini Collage of Engineering, Sangamner Abstract Providing
International Journal of Software and Web Sciences (IJSWS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
ATM FRAUD AND COUNTER MEASURES
ATM FRAUD AND COUNTER MEASURES GENESIS OF ATMs An automated teller machine was first introduced in 1960 by City Bank of New York on a trial basis. The concept of this machine was for customers to pay utility
Application of Neural Network in User Authentication for Smart Home System
Application of Neural Network in User Authentication for Smart Home System A. Joseph, D.B.L. Bong, D.A.A. Mat Abstract Security has been an important issue and concern in the smart home systems. Smart
INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY. Implementation of Multi-Factor Authentication Scheme
IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY Implementation of Multi-Factor Authentication Scheme Vasundhara Bhele Prof. Nilesh Chaubey Prof. Shyam Dubey Computer Science &
3D-WEBAUTHEN: HIGH DEGREE OF AUTHENTICATION FOR WEB APPLICATION DEVELOPMENT
3D-WEBAUTHEN: HIGH DEGREE OF AUTHENTICATION FOR WEB APPLICATION DEVELOPMENT Waraporn Viyanon Computer Science Program, Department of Mathematics Faculty of Science, Srinakharinwirot University Bangkok,
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
Providing Data Protection as a Service in Cloud Computing
International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 Providing Data Protection as a Service in Cloud Computing Sunumol Cherian *, Kavitha Murukezhan ** * Department
A method of generating free-route walk-through animation using vehicle-borne video image
A method of generating free-route walk-through animation using vehicle-borne video image Jun KUMAGAI* Ryosuke SHIBASAKI* *Graduate School of Frontier Sciences, Shibasaki lab. University of Tokyo 4-6-1
Preventing Identity Theft using Shift Key mechanism and QR Code with Sudoku Puzzle
DOI 10.4010/2014.282 ISSN-2321-3361 2014 IJESC Research Article Preventing Identity Theft using Shift Key mechanism and QR Code with Sudoku Puzzle R.Saisrikanth Department of Computer Science and Engineering
Protected Cash Withdrawal in Atm Using Mobile Phone
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar
SURVEY ON ONE TIME PASSWORD
SURVEY ON ONE TIME PASSWORD Nilesh Khankari, Geetanjali Kale Department of Computer Engineering, Pune Institute of Computer Technology, Pune, India ABSTRACT: Authentication is process in which right user
Application of Graphical Password as Knowledge-Based Authentication Mechanism
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. II (Nov Dec. 2014), PP 36-44 Application of Graphical Password as Knowledge-Based Authentication
A puzzle based authentication method with server monitoring
A puzzle based authentication method with server monitoring GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
ABSTRACT I. INTRODUCTION
Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
M-Pass: Web Authentication Protocol Resistant to Malware and Phishing
M-Pass: Web Authentication Protocol Resistant to Malware and Phishing Ajinkya S. Yadav M.E.student, Department of Computer Engineering. Pune University, Pune A. K.Gupta Professor, Department of Computer
How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
PREMIER PAS OF MOBILE INTERNET BUSINESS: A SURVEY RESEARCH ON MOBILE INTERNET SERVICE
PREMIER PAS OF MOBILE INTERNET BUSINESS: A SURVEY RESEARCH ON MOBILE INTERNET SERVICE Minhee Chae, Youngwan Choi, Hoyoung Kim, Hyoshik Yu & Jinwoo Kim Internet Business Research Center, Yonsei University
Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers!
Protect Your Privacy Online P 7/1 Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers! With the information in this article you can: Find out what secret information your PC is sharing with
Best Practices for Password Strength
A. Allan Research Note 6 December 2004 Passwords Are Near the Breaking Point Mitigating authentication weaknesses by increasing password length and complexity will reduce security if passwords are pushed
Chapter 5 Input. Chapter 5 Objectives. What Is Input? What Is Input? The Keyboard. The Keyboard
Chapter 5 Objectives Chapter 5 Input Define input List characteristics of of a keyboard Describe different mouse types and how they work Summarize how pointing devices work Explain how a digital camera
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Rahul Kale Neha Gore Kavita Nilesh Jadhav Mr. Swapnil Shinde Bachelor s Degree program in Information Technology Engineering
SESAME: Smartphone Enabled Secure Access to Multiple Entities
SESAME: Smartphone Enabled Secure Access to Multiple Entities Ameya Sanzgiri Anandatirtha Nandugudi Shambhu Upadhyaya Chunming Qiao Computer Science and Engineering, University at Buffalo, Buffalo, NY
Using Microsoft Project 2000
Using MS Project Personal Computer Fundamentals 1 of 45 Using Microsoft Project 2000 General Conventions All text highlighted in bold refers to menu selections. Examples would be File and Analysis. ALL
2 FACTOR + 2. Authentication WAY
2 FACTOR + 2 WAY Authentication Deepnet DualShield is an open, unified authentication platform that enables multi-factor strong authentication across diverse applications, users and security tokens. 5
SyncTap: An Interaction Technique for Mobile Networking
SyncTap: An Interaction Technique for Mobile Networking Jun Rekimoto, Yuji Ayatsuka, and Michimune Kohno Interaction Laboratory, Sony Computer Science Laboratories, Inc. 3-14-13 Higashigotanda, Shinagawa-ku,
Plotting: Customizing the Graph
Plotting: Customizing the Graph Data Plots: General Tips Making a Data Plot Active Within a graph layer, only one data plot can be active. A data plot must be set active before you can use the Data Selector
Preventing Abuse of Cookies Stolen by XSS
Preventing Abuse of Cookies Stolen by XSS Hiroya Takahashi Kenji Yasunaga Masahiro Mambo Kwangjo Kim KAIST Korea Heung Youl Youm Soonchunhyang University Korea Abstract Cross Site Scripting (XSS) makes
Traceable Physical Security Systems for a Safe and Secure Society
Hitachi Review Vol. 63 (2014), No. 5 254 Featured Articles Traceable Physical Security Systems for a Safe and Secure Society Tatsuhiko Kagehiro, Ph.D. Kenichi Yoneji Harumi Kiyomizu Yuki Watanabe, Dr.
A Proxy-Based Data Security Solution in Mobile Cloud
, pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,
Creating tables in Microsoft Access 2007
Platform: Windows PC Ref no: USER 164 Date: 25 th October 2007 Version: 1 Authors: D.R.Sheward, C.L.Napier Creating tables in Microsoft Access 2007 The aim of this guide is to provide information on using
Browsing and working with your files and folder is easy with Windows 7 s new look Windows Explorer.
Getting Started with Windows 7 In Windows 7, the desktop has been given an overhaul and makeover to introduce a clean new look. While the basic functionality remains the same, there are a few new navigation
A Reliable ATM Protocol and Comparative Analysis on Various Parameters with Other ATM Protocols
A Reliable ATM Protocol and Comparative Analysis on Various Parameters with Other ATM Protocols Anurag Anand Duvey 1, Dinesh Goyal 2, Dr. Naveen Hemrajani 3 1, 2, 3 Suresh Gyan Vihar University, Jaipur
DYNAMIC RANGE IMPROVEMENT THROUGH MULTIPLE EXPOSURES. Mark A. Robertson, Sean Borman, and Robert L. Stevenson
c 1999 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or
QUIT MACSCHOOL AND DRAG YOUR SERVER ICONS TO THE TRASH OR HIT THE DISCONNECT BUTTON BESIDE THE SERVER ICON IN THE TOP SIDEBAR
Macintosh Operating System OSX 10.3.x STARTING YOUR COMPUTER Logging in Whenever you start your computer, you will need to enter your computer password at the log in screen. When the log in screen appears,
Chapter 5 Understanding Input. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 5 Understanding Input Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define input and differentiate among a program, command, and user response Identify
MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph
MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of
Global Deployment of Finger Vein Authentication
Global Deployment of Finger Vein Authentication Hitachi Review Vol. 61 (2012), No. 1 35 Yutaka Matsui Akihito Sawada Shigenori Kaneko Yuji Nakamaru Ravi Ahluwalia Dipak Kumar OVERVIEW: Finger vein authentication
Against Spyware Using CAPTCHA in Graphical Password Scheme
Against Spyware Using CAPTCHA in Graphical Password Scheme Liming Wang, Xiuling Chang, Zhongjie Ren, Haichang Gao, Xiyang Liu Software Engineering Institute Xidian University Xi an, Shaanxi 710071, P.R.China
Securing Network Input via a Trusted Input Proxy
Securing Network Input via a Trusted Input Proxy Kevin Borders, Atul Prakash University of Michigan {kborders, aprakash}@umich.edu Abstract The increasing popularity of online transactions involving sensitive
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
Flash MX Image Animation
Flash MX Image Animation Introduction (Preparing the Stage) Movie Property Definitions: Go to the Properties panel at the bottom of the window to choose the frame rate, width, height, and background color
Visualizing Keyboard Pattern Passwords
Visualizing Keyboard Pattern Passwords Dino Schweitzer, Jeff Boleng, Colin Hughes, Louis Murphy United States Air Force Academy ABSTRACT Passwords are a fundamental security vulnerability in many systems.
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels
A Three Level Graphical Password Scheme for Providing High Degree of Security
A Three Level Graphical Password Scheme for Providing High Degree of Security Pranita H. Mokal 1, R. N. Denikar 2 1 Pune University, Amrutvahini College of Engineering, Sangamner-422605 2 Professor, Pune
Test Data Generation for Web Applications: A Constraint and Knowledge-based Approach
Test Data Generation for Web Applications: A Constraint and Knowledge-based Approach Hibiki Saito*, Shingo Takada Dept. of Information and Computer Science Keio University Yokohama, Japan Haruto Tanno,
A Beginner s Guide to PowerPoint 2010
A Beginner s Guide to PowerPoint 2010 I. The Opening Screen You will see the default opening screen is actually composed of three parts: 1. The Slides/Outline tabs on the left which displays thumbnails
A Comparative Study of Graphical and Alphanumeric Passwords for Mobile Device Authentication
A Comparative Study of Graphical and Alphanumeric Passwords for Mobile Device Authentication Mohd Anwar and Ashiq Imran Department of Computer Science North Carolina A&T State University [email protected],
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 7 Access Control Fundamentals Objectives Define access control and list the four access control models Describe logical access control
Create a Basic Skype* Account. Intel Easy Steps 1 2012 Intel Corporation All rights reserved.
Create a Basic Skype* Account Intel Easy Steps 1 2012 Intel Corporation Using Skype* to Communicate: Create and use a Basic Skype Account There are different ways of communicating and sharing through the
Information Technology Career Field Pathways and Course Structure
Information Technology Career Field Pathways and Course Structure Courses in Information Support and Services (N0) Computer Hardware 2 145025 Computer Software 145030 Networking 2 145035 Network Operating
ARM 9 BASED REAL TIME CONTROL AND VEHICLE THEFT IDENTITY SYSTEM
ARM 9 BASED REAL TIME CONTROL AND VEHICLE THEFT IDENTITY SYSTEM Ms. Radhika D. Rathi 1, Assistant Prof. Ashish Mulajkar 2, Assistant Prof. S. S. Badhe 3 1 Student, E&TCDepartment, Dr.D.Y.Patil School of
Why Cryptosystems Fail. By Ahmed HajYasien
Why Cryptosystems Fail By Ahmed HajYasien CS755 Introduction and Motivation Cryptography was originally a preserve of governments; military and diplomatic organisations used it to keep messages secret.
Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0
Flexible Identity Multi-Factor Authentication Tokenless authenticators guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services
ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING
Development of a Software Tool for Performance Evaluation of MIMO OFDM Alamouti using a didactical Approach as a Educational and Research support in Wireless Communications JOSE CORDOVA, REBECA ESTRADA
A Tap and Gesture Hybrid Method for Authenticating Smartphone Users
A Tap and Gesture Hybrid Method for Authenticating Smartphone Users Ahmed Sabbir Arif 1,2, Michel Pahud 1, Ken Hinckley 1, Bill Buxton 1 1 Microsoft Research One Microsoft Way Redmond, WA 98052 USA {mpahud,
Real Time Media Monitoring Web Service. Users Guide
Real Time Media Monitoring Web Service Users Guide 1. Contents 1. Contents...2 2. Introduction to Real Time Media Monitoring...3 3. How to use Real Time Media Monitoring Service...4 4. Homepage...5 5.
Visual Analysis Tool for Bipartite Networks
Visual Analysis Tool for Bipartite Networks Kazuo Misue Department of Computer Science, University of Tsukuba, 1-1-1 Tennoudai, Tsukuba, 305-8573 Japan [email protected] Abstract. To find hidden features
User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device
2008 International Conference on Computer and Electrical Engineering User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device Hataichanok
The Standard Normal distribution
The Standard Normal distribution 21.2 Introduction Mass-produced items should conform to a specification. Usually, a mean is aimed for but due to random errors in the production process we set a tolerance
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
A CASE STUDY OF ELECTRONIC SIGNATURE APPLIED IN PRE-EMPLOYMENT SCREENING INDUSTRY
100 A CASE STUDY OF ELECTRONIC SIGNATURE APPLIED IN PRE-EMPLOYMENT SCREENING INDUSTRY Miao Kang, Haris Mouratidis School of Computing, IT and Engineering, University of East London [email protected], [email protected]
