SlideShare una empresa de Scribd logo
1 de 29
 NURUL NADZIRAH BT ADNAN
 BTBL 17047005
 KRK 5
 PROF. MADYA DR. ZARINA BT
MOHAMAD
Data hiding in graphical password
authentication using combination zero-
knowledge protocol and
steganography
Introduction / project background
• Authentication can be divided into two categories which is message
authentication and entity authentication[1]
• User authentication system is the most common entity authentication system
implemented and used for decades[2]. And user authentication mechanisms are
currently categorized into three main types:
• Graphical User Authentication (GUA) is an authentication using Graphical or
Picture as password.
• Authentication Techniques are categorized into three groups which are Pure
Recall Based, Cued Recall Based and Recognition Based [3]. All these
techniques are of the same concept, in which authenticate user by Graphical
based technique
Problem statement
• Security and usability problems associated with alphanumeric
passwords as “the password problem” (Wiedenbeck, Waters,
Birget, Broditskiy & Memon, 2007).[5] The problem arises
because passwords are expected to comply with two
fundamentally conflicting requirements:
1) Textual passwords should be easy to remember, and the user
authentication protocol should be executable quickly and
easily by humans[1]
2) Passwords should be secure, i.e., they should look random
and should be hard to guess; they also should be changed
frequently, and should be different on different accounts of
the same user; they should not be written down or stored in
plain text.
• However, a strong textual password is hard to memorize and recollect.
Therefore, users tend to choose passwords that are either short or from the
dictionary, rather than random alphanumeric strings. Even worse, it is not
a rare case that users may use only one username and password for
multiple accounts.[3]
Objective
To propose the combination of the zero-knowledge protocol and steganography
techniques in the graphical password to provide the authentication and confidentiality of
the data.
To design an improved version of GUAS method with combination steganography and
zero-knowledge protocol.
To implement an authentication approach based on graphical password using zero-
knowledge protocol and steganography.
Scope
User
• Develop a user authentication system based on graphical scheme that is more user
friendly.
System
• Proposing an improved Graphical User Authentication (GUAS) algorithm with
steganography while balance the trade-off between level of security, usability and
reliability.
• Implement the usability features in Graphical Password Prototype System for the
authentication.
• To overcome the disadvantages of textual password, we proposed the graphical
password in a authentication sector as a real time scenario with additional of
steganography
• If the user have login in one pc, user cannot login in another pc until he/she logout the
system.
Limitation
Literature review
Methods/ techniques Description Example
1. Steganography
Advance Encryption
Standard (AES) algorithm
Circular Least Significant
Bit (LSB) algorithm
Satwinder Sigh & Varinder
Kaur Attri 2015 ( “Dual Layer
Security on Data using LSB &
AES” ) [11]
• AES is a symmetric-key algorithm which means
that same key is used for both decryption and
encryption of data.
• LSB works by replacing the least significant bit
of the Pixel value of the cover image (in most of
the cases 8th bit is replaced).
Techniques Usability
Authentication process Memorability Example
2. D'ej'a Vu
Sonkar S.K., Paikrao R.L.,
Awadesh Kumar, Graphical
Password Authentication
Based On Color Image 2005
[10]
choosing pictures
among the set of
pictures. These pictures
are presented in a
random manner
Each picture is derived from
an initial seed and no need to
store the pictures pixel by
pixel so only the seeds need to
be stored in the server.
Therefore an authentication
server does not need to store
the whole picture, it simple
needs to store the initial seed
3. Passface algorithm
Grinal Tuscano, Aakriti
TulasyanJournal of
Engineering Research and
Applications Vol. 5, Issues
3, (Part 5)March 2015[9]
asked to choose a
certain number of
images of human faces
from the picture
database
user recognizes and clicks on
the known face
6. PassPoint (Wieden-
2017)[5]
7. Cued Click Points
(Chiasson)[5]
8. Blonder (GregE- 2017)
[5]
Click on several preregistered
locations of a picture in the right
sequence
Can be easy to
remember the image
4. Draw-a-Secret (DAS)
algorithm
(Jermyn in 2012)[1]
User draw a graph on a 2D grid Drawing sequence is
easy to remember
5. Grid selection
algorithm
Abinaya1, Prabha T2,
Sudha C3 “A Shoulder
Surfing Resistant Graphical
Authentication System ”
June 2018 [2]
They zoom in and create the
secret as per the original DAS
scheme. The location of the
chosen drawing grid adds an
extra degree of complexity to the
password as there are thousands
of possible drawing grids within
the selection grid.
This technique in
theory could
significantly increase
the password space
by adding up to 16
bits to the password
space.
9. CD GPS
“Recall Based
Authentication System-
An Overview”) by P.
Baby Maruthi1, Dr. K.
Sandhya Rani2 2017[3]
Choose image on a set of
images and draw a secret on
image.
Drawing a secret
on image is easy
to remember
10. Passmatrix
Deepika C4 and Kokila
R5 “A Shoulder Surfing
Resistant Graphical
Authentication System ”
in Asian Journal of
Applied Science and
Tech (AJAST)v2018[2]
Choose image cell as password
after image has spitted into 7*11
matrix. It have three modules.
1. Image Discretization
Module
2. Horizontal And Vertical
Axis Control Module
3. Login Indicator Generator
Module
select a password
using horizontal
and vertical scroll
bars
Expected result
• Increase the security
protocol during the
authentication phase.
• Avoid the shoulder
surfing resistant or
bruteforce attack from
the hackers or attackers.
Gantt chart
Task FYP1 W1 W2 W3 W4 W5 W6 W7 W8 W9 W10 W11 W12 W13 W14
Project Title Proposal
Research
Proposal Presentation
Development of
Methodology
Report Drafting of Proposal
Final Presentation
Report Submission
[1] Keerthana M.M1, Archana MR2 “ Implementation of Graphical Authentication System for Shoulder
Surfing Attack” in International Journal of Innovative Research in Computer and Communication
Engineering (A High Impact Factor, Monthly, Peer Reviewed Journal) Vol. 6, Issue 2, February 2018.
[2] G Abinaya1, Prabha T2, Sudha C3, Deepika C4 and Kokila R5 “A Shoulder Surfing Resistant Graphical
Authentication System ” in Asian Journal of Applied Science and Technology (AJAST) (Open Access
Quarterly International Journal) Volume 2, Issue 2, Pages 549-556, April- June 2018.
[3] “Recall Based Authentication System- An Overview” in International Conference on Innovative Applications in
Engineering and Information Technology(ICIAEIT-2017) by P. Baby Maruthi1, Dr. K. Sandhya Rani2
[4] Advances in Information Science and Applications - Volume I (2017) “GPIP: A new Graphical Password
based on Image Portions” by Arash Habibi Lashkari Postgraduate Center of Studies (PGC), Limkokwing
University of creative technology (LUCT), Cyberjaya, Malaysia.
References
[5] S.Wiedenbeck, J.Waters, J. Birget, A. Brodskiy, and N. Memon, “PassPoints: Design and longitudinal evaluation of
a graphical password system,” International Journal of HumanComputer Studies, 2007.
[6] “Recall Based Authentication System- An Overview” in International Conference on Innovative Applications in
Engineering and Information Technology(ICIAEIT-2017) by P. Baby Maruthi1, Dr. K. Sandhya Rani2
[7] “Advanced Encryption Standard”, Douglas Selent, Rivier Academic Journal, Volume 6, Number 2, Fall 2010.
[8] Bin Li, Junhui He, Jiwu Huang, Yun Qing Shi. A survey on Image steganography and steganalysis, Volume 2,
Number 2, April 2011.
[9] Ms. Grinal Tuscano, Aakriti Tulasyan, Akshata Shetty, Malvina Rumao, AIshwarya Shetty, Graphical Password
Authentication using Passfaces, Int. Journal of Engineering Research and Applications, ISSN 2248-9622, Vol. 5,
Issues 3, (Part 5)March 2015, pp.60-64.
[10] Sonkar S.K., Paikrao R.L., Awadesh Kumar, Graphical Password Authentication Scheme Based On Color Image
Gallery, International Journal of Engineering and Innovative Technology (IJEIT) Volum2, Issue 4, October 2012
[11] Satwinder Sigh & Varinder Kaur Attri 2015 “Dual Layer Security of data using LSB Image Steganography Method
and AES Encryption Algorithm ” .
Figure above shows the framework about user authentication
System Architecture
System architecture is a conceptual model that defines the structure, behavior and more views of a
system; an architecture description is a formal description and representation of a system, organized
in a way that supports reasoning about the structures and behaviours of the system.
User Registration
• User enters complete details in form.( eg username, email, phone_number, first_name, last_name )
• View and select the images.
• Hash tags are created in the images
• Everything stored in database.
Login process
• User gives user id and request for OTP.
• Receives OTP.
• View images that choosen from the registration process.
• Generates password and string.
• Create hash
• Comparison hash
• If pass, it will direct to home page and if not it will display error message.
From the user perspective, the graphical password
authentication will work like this flowchart.
Figure above shows use case diagram user
D'ej'a Vu
Choosing pictures among the set of arts or abstract
pictures. These pictures are presented in a random manner
and we will have to choose it.
Least Significant Bit (LSB)
• Most commonly used to hide text or an image within a “stego image”
• One of the popular methods of steganography (LSB algorithm) which is the simplest technique to embed the
secret image data into the cover image by exchanging the least significant bit in odd bytes of the cover image
to hide bits from the secret image.
Why use the LSB?
• Human observe will be unable to distinguish between the original image and the stego image.
Steganography algorithm
There are several types of segmentation
images, one of this type is segment image
based on the bytes. In flowchart, it explain
about segmentation through the LSB
algorithm is applied, and it is expected that the
groups of bytes in the cover image submit
mixture distributions. After obtaining the
mixture distribution of bytes group for each
original and secret image, the next step is to
embed the secret image bytes into the original
image bytes. The following steps describe
how the proposed model works:
Proof of concept
Proof of concept

Más contenido relacionado

La actualidad más candente

Chapter 3: Strategic CRM
Chapter 3: Strategic CRMChapter 3: Strategic CRM
Chapter 3: Strategic CRM
itsvineeth209
 
Session 2 evolution of crm
Session 2 evolution of crmSession 2 evolution of crm
Session 2 evolution of crm
Delwin Arikatt
 
Frameworks to Follow (Public Speaking Essentials)
Frameworks to Follow (Public Speaking Essentials)Frameworks to Follow (Public Speaking Essentials)
Frameworks to Follow (Public Speaking Essentials)
Alberto Reuben Reyes
 
A Project on CRM and Call Center
A Project on CRM and Call Center A Project on CRM and Call Center
A Project on CRM and Call Center
nishakpillai
 

La actualidad más candente (20)

Demand forecasting
Demand forecastingDemand forecasting
Demand forecasting
 
Customer Relationship Management Raghu Seelamonthula
Customer Relationship Management   Raghu SeelamonthulaCustomer Relationship Management   Raghu Seelamonthula
Customer Relationship Management Raghu Seelamonthula
 
Purchasing, Procurement, Vendor, Contract and RFP Process Management with Sha...
Purchasing, Procurement, Vendor, Contract and RFP Process Management with Sha...Purchasing, Procurement, Vendor, Contract and RFP Process Management with Sha...
Purchasing, Procurement, Vendor, Contract and RFP Process Management with Sha...
 
Chapter 3: Strategic CRM
Chapter 3: Strategic CRMChapter 3: Strategic CRM
Chapter 3: Strategic CRM
 
Smarter Supply Chain – IBM Case Study in Supply Chain Transformation and Inno...
Smarter Supply Chain – IBM Case Study in Supply Chain Transformation and Inno...Smarter Supply Chain – IBM Case Study in Supply Chain Transformation and Inno...
Smarter Supply Chain – IBM Case Study in Supply Chain Transformation and Inno...
 
Customer Relationship Management Unit-3 IMBA Osmania University
Customer Relationship Management Unit-3 IMBA Osmania UniversityCustomer Relationship Management Unit-3 IMBA Osmania University
Customer Relationship Management Unit-3 IMBA Osmania University
 
Social Shopping
Social ShoppingSocial Shopping
Social Shopping
 
Session 2 evolution of crm
Session 2 evolution of crmSession 2 evolution of crm
Session 2 evolution of crm
 
Customer relationship management
Customer relationship managementCustomer relationship management
Customer relationship management
 
PAINLESS NEEDLE.pptx
PAINLESS NEEDLE.pptxPAINLESS NEEDLE.pptx
PAINLESS NEEDLE.pptx
 
Frameworks to Follow (Public Speaking Essentials)
Frameworks to Follow (Public Speaking Essentials)Frameworks to Follow (Public Speaking Essentials)
Frameworks to Follow (Public Speaking Essentials)
 
Digital branding
Digital brandingDigital branding
Digital branding
 
Operational CRM
Operational CRM Operational CRM
Operational CRM
 
BPR- An Introduction
BPR- An IntroductionBPR- An Introduction
BPR- An Introduction
 
Bigdata analysis in supply chain managment
Bigdata analysis in supply chain managmentBigdata analysis in supply chain managment
Bigdata analysis in supply chain managment
 
Vendor management
Vendor managementVendor management
Vendor management
 
CRM Architecture
CRM ArchitectureCRM Architecture
CRM Architecture
 
Infosys - Supply Chain Analytics Services | Solution
Infosys - Supply Chain Analytics Services | SolutionInfosys - Supply Chain Analytics Services | Solution
Infosys - Supply Chain Analytics Services | Solution
 
A Project on CRM and Call Center
A Project on CRM and Call Center A Project on CRM and Call Center
A Project on CRM and Call Center
 
City of Harare Land Investigations Report - 23 March 2010
City of Harare Land Investigations Report - 23 March 2010City of Harare Land Investigations Report - 23 March 2010
City of Harare Land Investigations Report - 23 March 2010
 

Similar a Data hiding in graphical password authentication using combination

2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
IAEME Publication
 
Hardware Design Practices For Modern Hardware
Hardware Design Practices For Modern HardwareHardware Design Practices For Modern Hardware
Hardware Design Practices For Modern Hardware
Winstina Kennedy
 

Similar a Data hiding in graphical password authentication using combination (20)

A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
 
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image Segmentation
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password System
 
Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
 
3 d password
3 d password3 d password
3 d password
 
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image PasswordResearch Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Password
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Ai4506179185
Ai4506179185Ai4506179185
Ai4506179185
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
 
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System             IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Scheme
 
Hardware Design Practices For Modern Hardware
Hardware Design Practices For Modern HardwareHardware Design Practices For Modern Hardware
Hardware Design Practices For Modern Hardware
 

Último

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Último (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

Data hiding in graphical password authentication using combination

  • 1.  NURUL NADZIRAH BT ADNAN  BTBL 17047005  KRK 5  PROF. MADYA DR. ZARINA BT MOHAMAD
  • 2. Data hiding in graphical password authentication using combination zero- knowledge protocol and steganography
  • 3. Introduction / project background • Authentication can be divided into two categories which is message authentication and entity authentication[1] • User authentication system is the most common entity authentication system implemented and used for decades[2]. And user authentication mechanisms are currently categorized into three main types:
  • 4. • Graphical User Authentication (GUA) is an authentication using Graphical or Picture as password. • Authentication Techniques are categorized into three groups which are Pure Recall Based, Cued Recall Based and Recognition Based [3]. All these techniques are of the same concept, in which authenticate user by Graphical based technique
  • 5. Problem statement • Security and usability problems associated with alphanumeric passwords as “the password problem” (Wiedenbeck, Waters, Birget, Broditskiy & Memon, 2007).[5] The problem arises because passwords are expected to comply with two fundamentally conflicting requirements: 1) Textual passwords should be easy to remember, and the user authentication protocol should be executable quickly and easily by humans[1] 2) Passwords should be secure, i.e., they should look random and should be hard to guess; they also should be changed frequently, and should be different on different accounts of the same user; they should not be written down or stored in plain text.
  • 6. • However, a strong textual password is hard to memorize and recollect. Therefore, users tend to choose passwords that are either short or from the dictionary, rather than random alphanumeric strings. Even worse, it is not a rare case that users may use only one username and password for multiple accounts.[3]
  • 7. Objective To propose the combination of the zero-knowledge protocol and steganography techniques in the graphical password to provide the authentication and confidentiality of the data. To design an improved version of GUAS method with combination steganography and zero-knowledge protocol. To implement an authentication approach based on graphical password using zero- knowledge protocol and steganography.
  • 8. Scope User • Develop a user authentication system based on graphical scheme that is more user friendly. System • Proposing an improved Graphical User Authentication (GUAS) algorithm with steganography while balance the trade-off between level of security, usability and reliability. • Implement the usability features in Graphical Password Prototype System for the authentication.
  • 9. • To overcome the disadvantages of textual password, we proposed the graphical password in a authentication sector as a real time scenario with additional of steganography • If the user have login in one pc, user cannot login in another pc until he/she logout the system. Limitation
  • 10. Literature review Methods/ techniques Description Example 1. Steganography Advance Encryption Standard (AES) algorithm Circular Least Significant Bit (LSB) algorithm Satwinder Sigh & Varinder Kaur Attri 2015 ( “Dual Layer Security on Data using LSB & AES” ) [11] • AES is a symmetric-key algorithm which means that same key is used for both decryption and encryption of data. • LSB works by replacing the least significant bit of the Pixel value of the cover image (in most of the cases 8th bit is replaced).
  • 11. Techniques Usability Authentication process Memorability Example 2. D'ej'a Vu Sonkar S.K., Paikrao R.L., Awadesh Kumar, Graphical Password Authentication Based On Color Image 2005 [10] choosing pictures among the set of pictures. These pictures are presented in a random manner Each picture is derived from an initial seed and no need to store the pictures pixel by pixel so only the seeds need to be stored in the server. Therefore an authentication server does not need to store the whole picture, it simple needs to store the initial seed 3. Passface algorithm Grinal Tuscano, Aakriti TulasyanJournal of Engineering Research and Applications Vol. 5, Issues 3, (Part 5)March 2015[9] asked to choose a certain number of images of human faces from the picture database user recognizes and clicks on the known face
  • 12. 6. PassPoint (Wieden- 2017)[5] 7. Cued Click Points (Chiasson)[5] 8. Blonder (GregE- 2017) [5] Click on several preregistered locations of a picture in the right sequence Can be easy to remember the image 4. Draw-a-Secret (DAS) algorithm (Jermyn in 2012)[1] User draw a graph on a 2D grid Drawing sequence is easy to remember 5. Grid selection algorithm Abinaya1, Prabha T2, Sudha C3 “A Shoulder Surfing Resistant Graphical Authentication System ” June 2018 [2] They zoom in and create the secret as per the original DAS scheme. The location of the chosen drawing grid adds an extra degree of complexity to the password as there are thousands of possible drawing grids within the selection grid. This technique in theory could significantly increase the password space by adding up to 16 bits to the password space.
  • 13. 9. CD GPS “Recall Based Authentication System- An Overview”) by P. Baby Maruthi1, Dr. K. Sandhya Rani2 2017[3] Choose image on a set of images and draw a secret on image. Drawing a secret on image is easy to remember 10. Passmatrix Deepika C4 and Kokila R5 “A Shoulder Surfing Resistant Graphical Authentication System ” in Asian Journal of Applied Science and Tech (AJAST)v2018[2] Choose image cell as password after image has spitted into 7*11 matrix. It have three modules. 1. Image Discretization Module 2. Horizontal And Vertical Axis Control Module 3. Login Indicator Generator Module select a password using horizontal and vertical scroll bars
  • 14. Expected result • Increase the security protocol during the authentication phase. • Avoid the shoulder surfing resistant or bruteforce attack from the hackers or attackers.
  • 15. Gantt chart Task FYP1 W1 W2 W3 W4 W5 W6 W7 W8 W9 W10 W11 W12 W13 W14 Project Title Proposal Research Proposal Presentation Development of Methodology Report Drafting of Proposal Final Presentation Report Submission
  • 16. [1] Keerthana M.M1, Archana MR2 “ Implementation of Graphical Authentication System for Shoulder Surfing Attack” in International Journal of Innovative Research in Computer and Communication Engineering (A High Impact Factor, Monthly, Peer Reviewed Journal) Vol. 6, Issue 2, February 2018. [2] G Abinaya1, Prabha T2, Sudha C3, Deepika C4 and Kokila R5 “A Shoulder Surfing Resistant Graphical Authentication System ” in Asian Journal of Applied Science and Technology (AJAST) (Open Access Quarterly International Journal) Volume 2, Issue 2, Pages 549-556, April- June 2018. [3] “Recall Based Authentication System- An Overview” in International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017) by P. Baby Maruthi1, Dr. K. Sandhya Rani2 [4] Advances in Information Science and Applications - Volume I (2017) “GPIP: A new Graphical Password based on Image Portions” by Arash Habibi Lashkari Postgraduate Center of Studies (PGC), Limkokwing University of creative technology (LUCT), Cyberjaya, Malaysia. References
  • 17. [5] S.Wiedenbeck, J.Waters, J. Birget, A. Brodskiy, and N. Memon, “PassPoints: Design and longitudinal evaluation of a graphical password system,” International Journal of HumanComputer Studies, 2007. [6] “Recall Based Authentication System- An Overview” in International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017) by P. Baby Maruthi1, Dr. K. Sandhya Rani2 [7] “Advanced Encryption Standard”, Douglas Selent, Rivier Academic Journal, Volume 6, Number 2, Fall 2010. [8] Bin Li, Junhui He, Jiwu Huang, Yun Qing Shi. A survey on Image steganography and steganalysis, Volume 2, Number 2, April 2011. [9] Ms. Grinal Tuscano, Aakriti Tulasyan, Akshata Shetty, Malvina Rumao, AIshwarya Shetty, Graphical Password Authentication using Passfaces, Int. Journal of Engineering Research and Applications, ISSN 2248-9622, Vol. 5, Issues 3, (Part 5)March 2015, pp.60-64. [10] Sonkar S.K., Paikrao R.L., Awadesh Kumar, Graphical Password Authentication Scheme Based On Color Image Gallery, International Journal of Engineering and Innovative Technology (IJEIT) Volum2, Issue 4, October 2012 [11] Satwinder Sigh & Varinder Kaur Attri 2015 “Dual Layer Security of data using LSB Image Steganography Method and AES Encryption Algorithm ” .
  • 18.
  • 19. Figure above shows the framework about user authentication
  • 20. System Architecture System architecture is a conceptual model that defines the structure, behavior and more views of a system; an architecture description is a formal description and representation of a system, organized in a way that supports reasoning about the structures and behaviours of the system. User Registration • User enters complete details in form.( eg username, email, phone_number, first_name, last_name ) • View and select the images. • Hash tags are created in the images • Everything stored in database. Login process • User gives user id and request for OTP. • Receives OTP. • View images that choosen from the registration process. • Generates password and string. • Create hash • Comparison hash • If pass, it will direct to home page and if not it will display error message.
  • 21. From the user perspective, the graphical password authentication will work like this flowchart.
  • 22. Figure above shows use case diagram user
  • 23. D'ej'a Vu Choosing pictures among the set of arts or abstract pictures. These pictures are presented in a random manner and we will have to choose it.
  • 24. Least Significant Bit (LSB) • Most commonly used to hide text or an image within a “stego image” • One of the popular methods of steganography (LSB algorithm) which is the simplest technique to embed the secret image data into the cover image by exchanging the least significant bit in odd bytes of the cover image to hide bits from the secret image. Why use the LSB? • Human observe will be unable to distinguish between the original image and the stego image. Steganography algorithm
  • 25. There are several types of segmentation images, one of this type is segment image based on the bytes. In flowchart, it explain about segmentation through the LSB algorithm is applied, and it is expected that the groups of bytes in the cover image submit mixture distributions. After obtaining the mixture distribution of bytes group for each original and secret image, the next step is to embed the secret image bytes into the original image bytes. The following steps describe how the proposed model works:
  • 27.
  • 28.