Use of Digital Image Watermarking to Enhance the Security of Graphical Password Authentication

There are several techniques for implement an authentication system for computers that most commonly use the clear text password. One of the security problems is the use of a text password, the lack of choosing a complicated password by users due to forgetting, and being guessable and retrieved by attackers. One of the methods for passing text passwords is the use of graphical password authentication systems that increase the amount of forgetting passwords by using images instead of text characters. In this paper, the security challenges of using a graphical password are discussed. Then, explain a method for using the watermarking digital image for the authentication process and providing an algorithm suitable for watermarking and enhance the security of graphical password authentication system, and its quantitative and qualitative security parameters will be examined.

[1]  Vibha Sazawal,et al.  Doodling our way to better authentication , 2002, CHI Extended Abstracts.

[2]  Susan Wiedenbeck,et al.  Design and evaluation of a shoulder-surfing resistant graphical password scheme , 2006, AVI '06.

[3]  Bostjan Brumen Security analysis of Game Changer Password System , 2019, Int. J. Hum. Comput. Stud..

[4]  Nasir D. Memon,et al.  Authentication using graphical passwords: effects of tolerance and image choice , 2005, SOUPS '05.

[5]  Adrian Perrig,et al.  This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .

[6]  Julie Thorpe,et al.  Graphical Dictionaries and the Memorable Space of Graphical Passwords , 2004, USENIX Security Symposium.

[7]  Yingjiu Li,et al.  EvoPass: Evolvable graphical password against shoulder-surfing attacks , 2017, Comput. Secur..

[8]  Rajeev Kumar Singh,et al.  A Survey: Digital Image Watermarking Techniques , 2014 .

[9]  Susan Wiedenbeck,et al.  Authentication Using Graphical Passwords: Basic Results , 2005 .

[10]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[11]  Michael K. Reiter,et al.  The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.

[12]  Kim-Kwang Raymond Choo,et al.  Visual Question Authentication Protocol (VQAP) , 2017, Comput. Secur..

[13]  Bostjan Brumen,et al.  Shoulder Surfing: From An Experimental Study to a Comparative Framework , 2019, Int. J. Hum. Comput. Stud..

[14]  J. Kase Graphical Passwords , 2008 .

[15]  Michael K. Reiter,et al.  On User Choice in Graphical Password Schemes , 2004, USENIX Security Symposium.