Authentication by Image Segmentation and Shuffling  
  Authors : Rupali Deshmukh; Smita Rukhande

 

A Prevention of data theft such as bank account numbers, credit card information, passwords, work related documents, etc. is essential in today’ communication systems, since many of our daily activities depend on the security of the data networks. Although Graphical Authentication Systems have been playing an important role in balking various kinds of bot attacks by acting as an additional mechanism over alphanumeric passwords, yet they have not been used for human authentication to its full potential. By exploiting its feature of easy memorability and the possibility of quadrillion permutation and combination of images that could form the graphical password, an independent human authentication system can be made. Thus, Graphical Password by Segmentation of Image is one such system that attempts to exploit the aforementioned criteria. This system segments the image like a grid, which has a maximum of 8 columns and 8 rows. Then, each segment of the image is dragged in a particular sequence onto an empty grid of size 8x8 and placed on a particular segment of the empty grid, to form the user’ password. If the user chooses to shuffle the segments during registration, the image segments will be presented in a shuffled manner when the user logs into the system and the user needs to drag each segment of the image onto the same empty grid of size 8x8 in the correct sequence and position of the segments that user had specified during registration.

 

Published In : IJCAT Journal Volume 4, Issue 12

Date of Publication : December 2017

Pages : 78-83

Figures :13

Tables : --

Publication Link :Authentication by Image Segmentation and Shuffling

 

 

 

Rupali Deshmukh : Department of Information Technology, Fr. C. Rodrigues Institute of Technology, Vashi Navi Mumbai, Maharashtra, India,400703.

Smita Rukhande : Department of Information Technology, Fr. C. Rodrigues Institute of Technology, Vashi Navi Mumbai, Maharashtra, India,400703.

 

 

 

 

 

 

 

Data Theft, Communication Systems, Security, Bot Attacks, Alphanumeric Password, Graphical Password, Memorability

Graphical passwords offers better security than textbased passwords because many people, in an attempt to memorize text-based passwords, use plain words rather than the recommended jumble of characters. A dictionary search can often hit on a password and allow a hacker to gain entry into a system in seconds. But in a series of selectable images, possible combinations that could form the graphical password are so many that it would take millions of years to break into the system.

 

 

 

 

 

 

 

 

 

[1] Rashika Koul, Tanya Kumar, Radhika Malpani, Ashwini Dhongade, Rupali Deshmukh, “GPSI: Graphical Password by Segmentation of Image” International Journal of Research and Scientific Innovation (IJRSI) | Volume III, Issue XI, November 2016 | ISSN 2321- 2705 [2] Ronald Fisher, Frank Yates [1938]. Statistical tables for biological, agricultural and medical research (3rd ed.). [3] Margaret Rouse, “ graphical password or graphical user authentication (GUA)”. [4] Xiaoyuan Suo , Ying Zhu, G. Scott Owen, “ Graphical Passwords: A Survey.”, DOI: 10.1109/CSAC.2005.27 · Source: DBLP Conference: 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA [5] Haiyu Song, Xiongfei Li , Pengjie Wang, Jingrun Chen, “ Block-Based Normalized-Cut Algorithm for Image Segmentation”, Online ISBN 978-3-642-05173-9 [6] J. C. Birget, D. Hong N. Memon, S. Man and S. Wiedenbeck., “The Graphical Passwords Project” Funded by the NSF Cyber Trust Program. [7] Ahmet Emir Dirik, Nasir Memon, Jean-Camille Birget, “Modeling user choice in the PassPoints graphical passwordscheme” [8] Arash Habibi Lashkari, Samaneh Farmand, Dr. Rosli Saleh, Dr. Omar Bin Zakaria, “A wide-range survey on Recall-Based Graphical User Authentications algorithms based on ISO and Attack Patterns ”, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 6, No. 3, 2009 [9] Saranya Ramanan, Bindhu J S, “A Survey on Different Graphical Password Authentication Techniques”, International Journal of Innovative Research in Computer and Communication Engineering (An ISO 3297: 2007 Certified Organization) Vol. 2, Issue 12, December 2014 [10] Arti Bhanushali, Bhavika Mange, Harshika Vyas, Hetal Bhanushali and Poonam Bhogle, “Comparison of Graphical Password Authentication Techniques”, International Journal of Computer Applications (0975 – 8887) Volume 116 – No. 1, April 2015 [11] Ibrahim Furkan Ince, Ilker Yengin, Yucel Batu Salman, Hwan-Gue Cho, Tae-Cheon Yang, “DESIGNING CAPTCHA ALGORITHM: SPLITTING AND ROTATING THE IMAGES AGAINST OCRs”, Third 2008 International Conference on Convergence and Hybrid Information Technology.