An Efficient Security Key for Practical Requirement of PIN Entry Protection Section Authentication

Clients regularly reuse the same customized recognizable proof numeric system for various sessions. Coordinate numeric sections can be profoundly powerless for the bear to break assaults and assailants can successfully watch PIN section with covered cameras. Backhanded PIN passage techniques proposed as countermeasures are seldom conveyed on the grounds that they request a heavier subjective workload for clients. To accomplish security and ease of use and display a useful aberrant PIN section technique called Stegano PIN. It has two main numbered systems, first is the secured, the second one is unclosed. Intended objectively for looking someone’s shoulder’s over direct observation of the hidden cameras. In the wake of finding a long haul PIN in the more run of the mill design, secured numeric system, client produces an OTP to securely come on the display assailants. The test control utilized an inside subject factorial outline with two autonomous factors- PIN section framework, recognized proof numeric write. The slow passage of distinguishing numeric system time however approved. The disguised numeric system is flexible to the direct observation overlooking someone’s shoulder through unseen camera assaults by different confirmation class.

[1]  G. A. Miller THE PSYCHOLOGICAL REVIEW THE MAGICAL NUMBER SEVEN, PLUS OR MINUS TWO: SOME LIMITS ON OUR CAPACITY FOR PROCESSING INFORMATION 1 , 1956 .

[2]  Robert H. Deng,et al.  Designing leakage-resilient password entry on touchscreen mobile devices , 2013, ASIA CCS '13.

[3]  Taekyoung Kwon,et al.  Covert Attentional Shoulder Surfing: Human Adversaries Are More Powerful Than Expected , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[4]  Daphna Weinshall,et al.  Cognitive authentication schemes safe against spyware , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[5]  Patrick Olivier,et al.  Multi-touch authentication on tabletops , 2010, CHI.

[6]  Andrea Prati,et al.  Integrating Consumer Smart Cameras into Camera Networks: Opportunities and Obstacles , 2014, Computer.

[7]  Hideki Imai,et al.  Human Identification Through Insecure Channel , 1991, EUROCRYPT.

[8]  Ian Oakley,et al.  The phone lock: audio and haptic shoulder-surfing resistant PIN entry methods for mobile devices , 2011, Tangible and Embedded Interaction.

[9]  Ted Taekyoung Kwon,et al.  SwitchPIN: Securing smartphone PIN entry with switchable keypads , 2014, 2014 IEEE International Conference on Consumer Electronics (ICCE).

[10]  Ian Oakley,et al.  Spinlock: A Single-Cue Haptic and Audio PIN Input Technique for Authentication , 2011, HAID.

[11]  Heinrich Hußmann,et al.  Towards understanding ATM security: a field study of real world ATM use , 2010, SOUPS.

[12]  Robert H. Deng,et al.  On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability , 2012, NDSS.

[13]  Shujun Li,et al.  Breaking undercover: exploiting design flaws and nonuniform human behavior , 2011, SOUPS.

[14]  Volker Roth,et al.  A PIN-entry method resilient against shoulder surfing , 2004, CCS '04.

[15]  Jin Hong,et al.  Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording Attacks , 2015, IEEE Transactions on Information Forensics and Security.

[16]  Shujun Li,et al.  Cryptanalysis of the convex hull click human identification protocol , 2010, International Journal of Information Security.

[17]  Susan Wiedenbeck,et al.  Design and evaluation of a shoulder-surfing resistant graphical password scheme , 2006, AVI '06.

[18]  Ted Taekyoung Kwon,et al.  SteganoPIN: Two-Faced Human–Machine Interface for Practical Enforcement of PIN Entry Security , 2016, IEEE Transactions on Human-Machine Systems.

[19]  Ian Oakley,et al.  Counting clicks and beeps: Exploring numerosity based haptic and audio PIN entry , 2012, Interact. Comput..

[20]  Nicolas Christin,et al.  Undercover: authentication usable in front of prying eyes , 2008, CHI.

[21]  Amit K. Roy-Chowdhury,et al.  Distributed Camera Networks , 2011, IEEE Signal Processing Magazine.

[22]  Johnny Long,et al.  No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing , 2008 .

[23]  David A. Wagner,et al.  Cryptanalysis of a Cognitive Authentication Scheme , 2006, IACR Cryptol. ePrint Arch..

[24]  N. Cowan The magical number 4 in short-term memory: A reconsideration of mental storage capacity , 2001, Behavioral and Brain Sciences.

[25]  Heinrich Hußmann,et al.  Vibrapass: secure authentication based on shared lies , 2009, CHI.