SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 8, No. 3, June 2018, pp. 1281~1287
ISSN: 2088-8708, DOI: 10.11591/ijece.v8i3.pp1281-1287  1281
Journal homepage: http://iaescore.com/journals/index.php/IJECE
The Security Challenges of The Rhythmprint Authentication
Nakinthorn Wongnarukane, Pramote Kuacharoen
Departement of Computer Science, Graduate School of Applied Statistics,
National Institute of Development Administration, Bangkok, Thailand
Article Info ABSTRACT
Article history:
Received Dec 28, 2017
Revised Feb 8, 2018
Accepted Mar 13, 2018
The Rhythmprint authentication combines an advantage of the traditional
keystroke authentication and the multi-touch technology based on a
touchable device such as touchpad on a laptop, a smartphone and a tablet.
With the Rhythmprint authentication, the user is less likely to suffer from
shoulder surfing and eavesdropping attacks. This research provides empirical
evidence to verify the security performance of the Rhythmprint
authentication comparing to the traditional keystroke authentication for
shoulder surfing and eavesdropping attacks, when the user tries to login to a
website on a laptop for 10 times in a public place while the attacker stands
behind. The experimental results show that the Rhythmprint authentication
provides higher security than the traditional keystroke authentication in both
shoulder surfing and eavesdropping attacks.
Keyword:
Fifth security
First rhythmprint
Fourth biometric
Second multi-touch
Third authentication Copyright Š 2018 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Nakinthorn Wongnarukane,
Departement of Computer Science,
Graduate School of Applied Statistics,
National Institute of Development Administration,
118 Serithai Road, Bangkapi Township, Bangkok 10240, Thailand.
Email: nakinthorn.n@gmail.com
1. INTRODUCTION
The Rhythmprint authentication [1] is a novel method of a biometric authentication. It combines an
advantage of the traditional keystroke authentication [2] and the multi-touch technology based on a touchpad
on a laptop, a screen of a smartphone and related touchable devices. The Rhythmprint authentication research
indicates that the user is less likely to suffer from shoulder surfing and eavesdropping attacks. Furthermore,
the initial results show that the Rhythmprint authentication provides higher security than other related
methods. This research is looking forward to comparing the security performance of the Rhythmprint
authentication to the traditional keystroke authentication, in terms of shoulder surfing and eavesdropping
attacks when the user tries to login to an application on laptop in a public place.
The Rhythmprint authentication uses multi-touch technology for collecting the rhythm when the
user touches a touchable device. Three measurements which consist of holding time, latency time and
number of fingers per beat, are collected and used to create the user template. When the user needs to login
to a device, the user only needs to touch fingers on the touchable device with the registered rhythm. K-NN
algorithm was used for classification. The attacker must perform shoulder surfing and eavesdropping attacks
in order to attack the authentication. This is because the attacker must know two things: the rhythm and the
number of fingers per beat. An eavesdropping attack hardly occurs because touching the finger on a device
does not makes a loud sound. The algorithm of Rhythmprint authentication can be split into two modules,
namely, registration module and authentication module. Figure 1 shows the registraition flowchart of
Rhythmprint authentication and Figure 2 shows how authentication of the Rhythmprint authentication works.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 3, June 2018 : 1281 – 1287
1282
Figure 1. The registration module flowchart
Figure 2. The authentication module flowchart
There are similar studies which use touchable devices to authenticate users. However, these studies
have many weak points. PassChords [3] uses multi-touch technology to collect the number of fingers for each
tap. Only four tabs are allowed. The user who needs to login to the device must touch four fingers on the
screen of smartphone. The system identifies the positions of four fingers including point, middle, ring and
little fingers. After that, the phone vibrates and the user can touch on the screen for authentication.
PassChords only records the number of fingers per tab, which limits to four taps. Therefore, PassChords is
not different from a traditional password authentication. Even worse, PassChords provides weaker security
than a password since there are less combinations.
In [4], Keystroke dynamics on android platform was proposed. This is a smartphone authentication
by using password that is inputted using softkeys on a smartphone screen. Three measurements which
include holding time, latency time and pressing pressure, are used to authenticate users. This method
provides better security than using a password alone. However, it is not different from a traditional keystroke
dyanamics. It only changes from a hardware keyboard to a virtual keyboard. The pressing pressure is not a
suitable factor to use in real life, because the pressing pressure is different when the user is doing different
activities.
An extended pin authentication scheme allows multi-touch key input [5] using a PIN and multi-
touch technology on smartphones. They allow the user to use more than one finger when touching digit
buttons on the screen. It is similar to the work in [4] but the scheme only uses a numeric virtual keyboard and
adds multi-touch for keyboard input.
Touch pad, Touch screen
Feature Extraction
- Number of Finger/Beat
- Holding Time
- Latency Time
User Template Created
Database
Touch pad, Touch screen Feature Extraction
Number of
Finger /
Rhythm
Holding time Latency time
Database
Found
Reject Authenticated
True
Minimum
Record
Find
Matching
Records
Find
Matching
Records
Found
TrueFalse
Int J Elec & Comp Eng ISSN: 2088-8708 
The Security Challenges of the Rhythmprint Authentication (Nakinthorn Wongnarukane)
1283
Development of a typing behavior recognition mechanism on Android and traditional keystroke [6]
is just like a tradition keystroke, but it moves from hardware keyboard to smartphone screen, using three
measurements: holding time, latency time and password.
The proposed methods in [4]-[6] have the same weak point, the user must look at the screen until the
authentication is successful. Because the method uses a virtual keyboard and the screen is small, if the user is
not looking on the screen while tapping, the user will not be able to login successfully. This method also
suffers from shoulder surfing attacks. For the proposed method in [3], the user does not need to look at the
screen when loging in, unlike [4]-[6]. However, in public places, using only the number of fingers per tap as
an authentication is not enough to prevent shoulder surfing attacks. When comparing only functions of the
Rhythmprint authentication with [2]-[6], we found that the Rhythmprint authentication provides higher
security than others methods.
In this paper, we provide an empirical assessment of the security performance of the Rhythmprint
authentication in terms of shoulder surfing and eavesdropping attacks. The results of experiments are
compared with the traditional keystroke authentication.
2. RESEARCH METHOD
This research attempts to measure the Rhythmprint authentication [1] security in terms of shoulder
surfing and eavesdropping attacks by comparing to a traditional keystroke authentication. We implemented
all authentication programs for the Rhythmprint authentication and the traditional keystroke methods on
laptops. For the experimental design, we simulate the situation where the user must authenticate
himself/herself to an application on a laptop while sitting in a public place and an attacker stands behind the
user. The attacker stands behind the user all the time while the user is trying to authenticate himself/herself to
application on a laptop using the Rhythmprint authentication and the traditional keystroke authentication.
For each method, the user must try to authenticate 10 times, the attacker has to perform shoulder
surfing and eavesdropping attacks everytime. The user enters the password on the keyboard for the traditional
keystroke authentication and makes the rhythm on the touchpad for the Rythmpring authentication.
Everytime the user can authenticate successfully, we test whether or not the attacker is able to authenticate
on the victim’s laptop. The results are recorded. Figure 3 shows the simulated situation of shoulder surfing
attacks. We design the experiment using two methods including with a hand covering and no hands covering
as described in detail in the following sections.
Figure 3. The shoulder surfing attack situation
2.1. Hand covering
We allow the user to use the other hand to cover the touching hand when tapping on the touchpad or
stroking the keyboard. Figure 4 shows when the user tries to authenticate to the applicaiton on a laptop with
the traditional keystroke method with hand covering and Figure 5 shows when the user tries to authenticate to
the applicaiton on a laptop with the Rhthmprint method and uses the hand to cover.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 3, June 2018 : 1281 – 1287
1284
Figure 4. The traditional keystroke authentication
with hand covering
Figure 5. The Rhythmprint authentication with hand
covering
2.2. No hand covering
We do not allow the user to use the other hand to cover the touching hand when tapping on the
touchpad or stroking the keyboard. Figure 6 shows when the user tries to authenticate to the applicaiton on a
laptop with the traditional keystroke method without hand covering and Figure 7 shows when the user tries to
authenticate to the applicaiton on a laptop with the Rhthmprint method without hand covering.
Figure 6. The traditional keystroke without hand
covering authentication
Figure 7. The Rhythmprint without hand covering
authentication
3. RESULTS AND ANALYSIS
For verifying our proposed method, we designed and developed software on a laptop uisng Java
programming language. For a laptop in our experiment, we used Macbook Pro by Apple Inc. We recruited 10
participants which consists of five males and five females, between 30-40 and one male as an attacker.
All users must authenticate themselves to the application on our laptop 10 times per method, while
the attacker is standing behind them. Each time the authentication is complete, the attacker tries to
authenticate himself on the victim’s laptop. The experiment is divided into two parts including hand covering
and no hands covering experiments.
3.1. Hand covering experimental results
While users were tapping on the screen or stroking the keyboard to authenticate themselves, we
allowed users to use the other hand to cover the tapping hand. Table 1 shows the experimental results of this
method.
From Table 1, we can calculate the security performance of the Rhythmprint method comparing to
the traditional keystroke method by using arithmetic mean x and S.D. (standard deviation).
The equation of x is shown below
Int J Elec & Comp Eng ISSN: 2088-8708 
The Security Challenges of the Rhythmprint Authentication (Nakinthorn Wongnarukane)
1285
The equation of S.D. is shown below
x of the Rhythmprint is
S.D. of the Rhythmprint is
√
( ) ( ) ( ) ( )
( ) ( ) ( ) ( )
( ) ( )
x of the traditional keystroke is
S.D. of the traditional keystroke is
√
( ) ( ) ( ) ( )
( ) ( ) ( ) ( )
( ) ( )
Table 1. Hand Cover Experimental Results
User Attack Success Time
Rhythmprint Keystroke
1 0 7
2 0 0
3 0 8
4 9 9
5 0 0
6 0 5
7 0 7
8 8 9
9 0 9
10 0 0
3.2. No hand covering experimental results
While users were tapping on the screen or stroking the keyboard to authenticate themselves, users
were not allowed to use the other hand to cover the tapping or the typing hand. Table 2 shows the
experimental results of this method.
From Table 2, we can calculate the security performance of Rhythmprint method comparing to the
traditional keystroke method by using arithmetic mean x and S.D. (standard deviation).
x of the Rhythmprint is
S.D. of the Rhythmprint is
√
( ) ( ) ( ) ( )
( ) ( ) ( ) ( )
( ) ( )
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 3, June 2018 : 1281 – 1287
1286
x of the traditional keystroke is
S.D. of the traditional keystroke is
√
( ) ( ) ( ) ( )
( ) ( ) ( ) ( )
( ) ( )
The experimetal results show the security performance of the Rhythmprint authentication comparing
to the traditional keystroke authentication. In the hand covering method case, only 2 of 10 volunteers of the
Rhythmprint authentication were attacked successfully and the minimumtime to crack the victim’s rhythm is
8, but 7 of 10 of the traditional keystroke authentions were attacked and the minimum time to crack victim’s
stroke is 5. The x and S.D. of the experiment in this case show that the Rhythmprint authentication provides
higher security than traditional keystroke. In the no hand covering method case, only 4 of 10 volunteers of
the Rhythmprint authentication were attacked successfully and the minimum time to crack victim’s rhythm is
7, while all of the traditional keystroke authentications were attacked and the minimum time to crack victim
stroke is 1. The x and S.D. of the experiment in this case show that the Rhythmprint authentication also
provides higher security than the traditional keystroke.
Table 2. No. Hand Cover Experimental Results
User Attack Success Time
Rhythmprint Keystrike
1 0 3
2 8 5
3 0 4
4 0 2
5 7 4
6 0 3
7 7 5
8 0 1
9 9 7
10 0 8
4. CONCLUSION
From the experimeatal results, we can conclude the Rhythmprint authentication provides higher
security than the traditional keystroke authentication in terms of shoulder surfing and eavesdropping attacks.
For the Rhythmprint authentication, when the user touches or tabs on the touchpad, it does not make a loud
sound. Therefore, eavesdropping attacks is unlikely. However, the traditional keystroke authentication can
suffer from eavesdropping attacks if the user is not careful when typing on the buttons.
For the shoulder surfing attacks, since the Rhythmprint authentication does not require any button
and any fixed position on the touchpad, the user can touch the finger on the touchpad without looking at the
touchpad and can use the other hand to cover while touching. However, the traditional keystroke
authentication requires the buttons which are located at fixed positions. As a result, the user must be able to
see keyboard while making strokes for authentication. If the user uses the other hand to cover the stroking
hand, the user can perform the task more slowly which can be easily detected by an attacker. The experiment
shows that if the users tried to authenticate in a public place without anything covering the stroking hand in
the traditional keystroke authentication, the users were attacked 100% of the time. However, only 4 of 10
volunteers of the Rhythmprint authentication were attacked successfully and the minimum time to crack a
victim rhythm is 7.
REFERENCES
[1] N. Wongnarukane and P. Kuacharoen, "Rhythm Authentication Using Multi-touch Technology: A New Method of
Biometric Authentication," Lecture Notes in Computer Science (LNCS) Springer, Cham., 2017, pp. 390-399.
[2] D. Shanmugapriya and P. Ganapathi, "A survey of biometric keystroke dynamics: Approaches, security and
challenges," arXiv preprint arXiv:0910.0817, 2009.
[3] S. Azenkot, et al., “PassChords: secure multi-touch authentication for blind people,” in Proc. of the 14th
international ACM SIGACCESS conference on Computers and accessibility, Oct 2012.
Int J Elec & Comp Eng ISSN: 2088-8708 
The Security Challenges of the Rhythmprint Authentication (Nakinthorn Wongnarukane)
1287
[4] M. Antal, Z.S. László and L. Izabella, “Keystroke dynamics on android platform,” in Procedia Technology, 2015.
[5] T. Takada and Y. Kokubun, “Extended pin authentication scheme allowing multi-touch key input,” in Proc. of
International Conference on Advances in Mobile Computing & Multimedia, Dec 2013.
[6] X. Huang, G. Lund and A. Sapeluk, “Development of a typing behaviour recognition mechanism on Android”, In
2012 IEEE 11th International Conference on Trust, Security and Pri-vacy in Computing and Communications,
IEEE, Jun 2012.
BIOGRAPHIES OF AUTHORS
Nakinthorn Wongnarukane. Received his B.S. in computer science from Kasetsart University and
M.E. degrees in computer science from National Institute of Development Administration (NIDA) in
2010 and 2012. He started studying in Ph.D. in 2015 at National Institute of Development
Administration in computer science. His research interests are information security and mobile
application.
Assistant Professor Dr. Pramote Kuacharoen. Received his B.S. and M.E. degrees in computer and
systems engineering from Rensselaer Polytechnic Institute (RPI) in 1995 and 1996, respectively. He
also received his M.S. and Ph.D. degrees in electrical and computer engineering from the Georgia
Institute of Technology in 2001 and 2004, respectively. He joined the Department of Computer
Science at National Institute of Development Administration in 2004. His research interests include
computer and network security, information security, computer networks, embedded systems, and
mobile applications design and development.

More Related Content

What's hot

Keylogging resistant visual authentication Protocols
Keylogging resistant visual authentication ProtocolsKeylogging resistant visual authentication Protocols
Keylogging resistant visual authentication ProtocolsVishnu Toparies
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemEditor IJCATR
 
2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacementTELKOMNIKA JOURNAL
 
Research paper_Anshul _Ankita_RSG
Research paper_Anshul _Ankita_RSGResearch paper_Anshul _Ankita_RSG
Research paper_Anshul _Ankita_RSGAnshul Sahu
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationseSAT Publishing House
 
Color Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnologyColor Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnologyIRJET Journal
 
120 i143
120 i143120 i143
120 i143Hai Nguyen
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordIOSR Journals
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355aissmsblogs
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET Journal
 
One time password generation using mathematical random function in sphere spa...
One time password generation using mathematical random function in sphere spa...One time password generation using mathematical random function in sphere spa...
One time password generation using mathematical random function in sphere spa...EditorIJAERD
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor AuthenticationIRJET Journal
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET Journal
 
Rorschach Based Security for Smartphones
Rorschach Based Security for SmartphonesRorschach Based Security for Smartphones
Rorschach Based Security for Smartphonesijsrd.com
 
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSSmartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSEditor IJCATR
 

What's hot (20)

Keylogging resistant visual authentication Protocols
Keylogging resistant visual authentication ProtocolsKeylogging resistant visual authentication Protocols
Keylogging resistant visual authentication Protocols
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
 
2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement
 
Class 8, 9 and 10
Class 8, 9 and 10Class 8, 9 and 10
Class 8, 9 and 10
 
Research paper_Anshul _Ankita_RSG
Research paper_Anshul _Ankita_RSGResearch paper_Anshul _Ankita_RSG
Research paper_Anshul _Ankita_RSG
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
Color Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnologyColor Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnology
 
A011140104
A011140104A011140104
A011140104
 
120 i143
120 i143120 i143
120 i143
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
 
One time password generation using mathematical random function in sphere spa...
One time password generation using mathematical random function in sphere spa...One time password generation using mathematical random function in sphere spa...
One time password generation using mathematical random function in sphere spa...
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
 
Rorschach Based Security for Smartphones
Rorschach Based Security for SmartphonesRorschach Based Security for Smartphones
Rorschach Based Security for Smartphones
 
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSSmartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMS
 

Similar to The Security Challenges of The Rhythmprint Authentication

IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET Journal
 
Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...IJECEIAES
 
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)CSCJournals
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
Detection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phonesDetection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phonesIAEME Publication
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesIAEME Publication
 
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...IJNSA Journal
 
Securing Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationSecuring Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationApurva Kini
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONIJCNCJournal
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONIJCNCJournal
 
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET Journal
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationeSAT Journals
 
IRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET Journal
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolIJERD Editor
 
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...IRJET Journal
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...ADEIJ Journal
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationIRJET Journal
 
An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...ijctcm
 
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry PiSmart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Piijtsrd
 

Similar to The Security Challenges of The Rhythmprint Authentication (20)

IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
 
Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...
 
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Detection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phonesDetection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phones
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
 
Securing Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationSecuring Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint Authentication
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
 
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET- Authentication System in Social Networks
IRJET- Authentication System in Social Networks
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
IRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM Machine
 
D0351022026
D0351022026D0351022026
D0351022026
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication Protocol
 
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
 
An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...
 
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry PiSmart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Pi
 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 

Recently uploaded (20)

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 

The Security Challenges of The Rhythmprint Authentication

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 8, No. 3, June 2018, pp. 1281~1287 ISSN: 2088-8708, DOI: 10.11591/ijece.v8i3.pp1281-1287  1281 Journal homepage: http://iaescore.com/journals/index.php/IJECE The Security Challenges of The Rhythmprint Authentication Nakinthorn Wongnarukane, Pramote Kuacharoen Departement of Computer Science, Graduate School of Applied Statistics, National Institute of Development Administration, Bangkok, Thailand Article Info ABSTRACT Article history: Received Dec 28, 2017 Revised Feb 8, 2018 Accepted Mar 13, 2018 The Rhythmprint authentication combines an advantage of the traditional keystroke authentication and the multi-touch technology based on a touchable device such as touchpad on a laptop, a smartphone and a tablet. With the Rhythmprint authentication, the user is less likely to suffer from shoulder surfing and eavesdropping attacks. This research provides empirical evidence to verify the security performance of the Rhythmprint authentication comparing to the traditional keystroke authentication for shoulder surfing and eavesdropping attacks, when the user tries to login to a website on a laptop for 10 times in a public place while the attacker stands behind. The experimental results show that the Rhythmprint authentication provides higher security than the traditional keystroke authentication in both shoulder surfing and eavesdropping attacks. Keyword: Fifth security First rhythmprint Fourth biometric Second multi-touch Third authentication Copyright Š 2018 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Nakinthorn Wongnarukane, Departement of Computer Science, Graduate School of Applied Statistics, National Institute of Development Administration, 118 Serithai Road, Bangkapi Township, Bangkok 10240, Thailand. Email: nakinthorn.n@gmail.com 1. INTRODUCTION The Rhythmprint authentication [1] is a novel method of a biometric authentication. It combines an advantage of the traditional keystroke authentication [2] and the multi-touch technology based on a touchpad on a laptop, a screen of a smartphone and related touchable devices. The Rhythmprint authentication research indicates that the user is less likely to suffer from shoulder surfing and eavesdropping attacks. Furthermore, the initial results show that the Rhythmprint authentication provides higher security than other related methods. This research is looking forward to comparing the security performance of the Rhythmprint authentication to the traditional keystroke authentication, in terms of shoulder surfing and eavesdropping attacks when the user tries to login to an application on laptop in a public place. The Rhythmprint authentication uses multi-touch technology for collecting the rhythm when the user touches a touchable device. Three measurements which consist of holding time, latency time and number of fingers per beat, are collected and used to create the user template. When the user needs to login to a device, the user only needs to touch fingers on the touchable device with the registered rhythm. K-NN algorithm was used for classification. The attacker must perform shoulder surfing and eavesdropping attacks in order to attack the authentication. This is because the attacker must know two things: the rhythm and the number of fingers per beat. An eavesdropping attack hardly occurs because touching the finger on a device does not makes a loud sound. The algorithm of Rhythmprint authentication can be split into two modules, namely, registration module and authentication module. Figure 1 shows the registraition flowchart of Rhythmprint authentication and Figure 2 shows how authentication of the Rhythmprint authentication works.
  • 2.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 3, June 2018 : 1281 – 1287 1282 Figure 1. The registration module flowchart Figure 2. The authentication module flowchart There are similar studies which use touchable devices to authenticate users. However, these studies have many weak points. PassChords [3] uses multi-touch technology to collect the number of fingers for each tap. Only four tabs are allowed. The user who needs to login to the device must touch four fingers on the screen of smartphone. The system identifies the positions of four fingers including point, middle, ring and little fingers. After that, the phone vibrates and the user can touch on the screen for authentication. PassChords only records the number of fingers per tab, which limits to four taps. Therefore, PassChords is not different from a traditional password authentication. Even worse, PassChords provides weaker security than a password since there are less combinations. In [4], Keystroke dynamics on android platform was proposed. This is a smartphone authentication by using password that is inputted using softkeys on a smartphone screen. Three measurements which include holding time, latency time and pressing pressure, are used to authenticate users. This method provides better security than using a password alone. However, it is not different from a traditional keystroke dyanamics. It only changes from a hardware keyboard to a virtual keyboard. The pressing pressure is not a suitable factor to use in real life, because the pressing pressure is different when the user is doing different activities. An extended pin authentication scheme allows multi-touch key input [5] using a PIN and multi- touch technology on smartphones. They allow the user to use more than one finger when touching digit buttons on the screen. It is similar to the work in [4] but the scheme only uses a numeric virtual keyboard and adds multi-touch for keyboard input. Touch pad, Touch screen Feature Extraction - Number of Finger/Beat - Holding Time - Latency Time User Template Created Database Touch pad, Touch screen Feature Extraction Number of Finger / Rhythm Holding time Latency time Database Found Reject Authenticated True Minimum Record Find Matching Records Find Matching Records Found TrueFalse
  • 3. Int J Elec & Comp Eng ISSN: 2088-8708  The Security Challenges of the Rhythmprint Authentication (Nakinthorn Wongnarukane) 1283 Development of a typing behavior recognition mechanism on Android and traditional keystroke [6] is just like a tradition keystroke, but it moves from hardware keyboard to smartphone screen, using three measurements: holding time, latency time and password. The proposed methods in [4]-[6] have the same weak point, the user must look at the screen until the authentication is successful. Because the method uses a virtual keyboard and the screen is small, if the user is not looking on the screen while tapping, the user will not be able to login successfully. This method also suffers from shoulder surfing attacks. For the proposed method in [3], the user does not need to look at the screen when loging in, unlike [4]-[6]. However, in public places, using only the number of fingers per tap as an authentication is not enough to prevent shoulder surfing attacks. When comparing only functions of the Rhythmprint authentication with [2]-[6], we found that the Rhythmprint authentication provides higher security than others methods. In this paper, we provide an empirical assessment of the security performance of the Rhythmprint authentication in terms of shoulder surfing and eavesdropping attacks. The results of experiments are compared with the traditional keystroke authentication. 2. RESEARCH METHOD This research attempts to measure the Rhythmprint authentication [1] security in terms of shoulder surfing and eavesdropping attacks by comparing to a traditional keystroke authentication. We implemented all authentication programs for the Rhythmprint authentication and the traditional keystroke methods on laptops. For the experimental design, we simulate the situation where the user must authenticate himself/herself to an application on a laptop while sitting in a public place and an attacker stands behind the user. The attacker stands behind the user all the time while the user is trying to authenticate himself/herself to application on a laptop using the Rhythmprint authentication and the traditional keystroke authentication. For each method, the user must try to authenticate 10 times, the attacker has to perform shoulder surfing and eavesdropping attacks everytime. The user enters the password on the keyboard for the traditional keystroke authentication and makes the rhythm on the touchpad for the Rythmpring authentication. Everytime the user can authenticate successfully, we test whether or not the attacker is able to authenticate on the victim’s laptop. The results are recorded. Figure 3 shows the simulated situation of shoulder surfing attacks. We design the experiment using two methods including with a hand covering and no hands covering as described in detail in the following sections. Figure 3. The shoulder surfing attack situation 2.1. Hand covering We allow the user to use the other hand to cover the touching hand when tapping on the touchpad or stroking the keyboard. Figure 4 shows when the user tries to authenticate to the applicaiton on a laptop with the traditional keystroke method with hand covering and Figure 5 shows when the user tries to authenticate to the applicaiton on a laptop with the Rhthmprint method and uses the hand to cover.
  • 4.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 3, June 2018 : 1281 – 1287 1284 Figure 4. The traditional keystroke authentication with hand covering Figure 5. The Rhythmprint authentication with hand covering 2.2. No hand covering We do not allow the user to use the other hand to cover the touching hand when tapping on the touchpad or stroking the keyboard. Figure 6 shows when the user tries to authenticate to the applicaiton on a laptop with the traditional keystroke method without hand covering and Figure 7 shows when the user tries to authenticate to the applicaiton on a laptop with the Rhthmprint method without hand covering. Figure 6. The traditional keystroke without hand covering authentication Figure 7. The Rhythmprint without hand covering authentication 3. RESULTS AND ANALYSIS For verifying our proposed method, we designed and developed software on a laptop uisng Java programming language. For a laptop in our experiment, we used Macbook Pro by Apple Inc. We recruited 10 participants which consists of five males and five females, between 30-40 and one male as an attacker. All users must authenticate themselves to the application on our laptop 10 times per method, while the attacker is standing behind them. Each time the authentication is complete, the attacker tries to authenticate himself on the victim’s laptop. The experiment is divided into two parts including hand covering and no hands covering experiments. 3.1. Hand covering experimental results While users were tapping on the screen or stroking the keyboard to authenticate themselves, we allowed users to use the other hand to cover the tapping hand. Table 1 shows the experimental results of this method. From Table 1, we can calculate the security performance of the Rhythmprint method comparing to the traditional keystroke method by using arithmetic mean x and S.D. (standard deviation). The equation of x is shown below
  • 5. Int J Elec & Comp Eng ISSN: 2088-8708  The Security Challenges of the Rhythmprint Authentication (Nakinthorn Wongnarukane) 1285 The equation of S.D. is shown below x of the Rhythmprint is S.D. of the Rhythmprint is √ ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) x of the traditional keystroke is S.D. of the traditional keystroke is √ ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) Table 1. Hand Cover Experimental Results User Attack Success Time Rhythmprint Keystroke 1 0 7 2 0 0 3 0 8 4 9 9 5 0 0 6 0 5 7 0 7 8 8 9 9 0 9 10 0 0 3.2. No hand covering experimental results While users were tapping on the screen or stroking the keyboard to authenticate themselves, users were not allowed to use the other hand to cover the tapping or the typing hand. Table 2 shows the experimental results of this method. From Table 2, we can calculate the security performance of Rhythmprint method comparing to the traditional keystroke method by using arithmetic mean x and S.D. (standard deviation). x of the Rhythmprint is S.D. of the Rhythmprint is √ ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( )
  • 6.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 3, June 2018 : 1281 – 1287 1286 x of the traditional keystroke is S.D. of the traditional keystroke is √ ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) The experimetal results show the security performance of the Rhythmprint authentication comparing to the traditional keystroke authentication. In the hand covering method case, only 2 of 10 volunteers of the Rhythmprint authentication were attacked successfully and the minimumtime to crack the victim’s rhythm is 8, but 7 of 10 of the traditional keystroke authentions were attacked and the minimum time to crack victim’s stroke is 5. The x and S.D. of the experiment in this case show that the Rhythmprint authentication provides higher security than traditional keystroke. In the no hand covering method case, only 4 of 10 volunteers of the Rhythmprint authentication were attacked successfully and the minimum time to crack victim’s rhythm is 7, while all of the traditional keystroke authentications were attacked and the minimum time to crack victim stroke is 1. The x and S.D. of the experiment in this case show that the Rhythmprint authentication also provides higher security than the traditional keystroke. Table 2. No. Hand Cover Experimental Results User Attack Success Time Rhythmprint Keystrike 1 0 3 2 8 5 3 0 4 4 0 2 5 7 4 6 0 3 7 7 5 8 0 1 9 9 7 10 0 8 4. CONCLUSION From the experimeatal results, we can conclude the Rhythmprint authentication provides higher security than the traditional keystroke authentication in terms of shoulder surfing and eavesdropping attacks. For the Rhythmprint authentication, when the user touches or tabs on the touchpad, it does not make a loud sound. Therefore, eavesdropping attacks is unlikely. However, the traditional keystroke authentication can suffer from eavesdropping attacks if the user is not careful when typing on the buttons. For the shoulder surfing attacks, since the Rhythmprint authentication does not require any button and any fixed position on the touchpad, the user can touch the finger on the touchpad without looking at the touchpad and can use the other hand to cover while touching. However, the traditional keystroke authentication requires the buttons which are located at fixed positions. As a result, the user must be able to see keyboard while making strokes for authentication. If the user uses the other hand to cover the stroking hand, the user can perform the task more slowly which can be easily detected by an attacker. The experiment shows that if the users tried to authenticate in a public place without anything covering the stroking hand in the traditional keystroke authentication, the users were attacked 100% of the time. However, only 4 of 10 volunteers of the Rhythmprint authentication were attacked successfully and the minimum time to crack a victim rhythm is 7. REFERENCES [1] N. Wongnarukane and P. Kuacharoen, "Rhythm Authentication Using Multi-touch Technology: A New Method of Biometric Authentication," Lecture Notes in Computer Science (LNCS) Springer, Cham., 2017, pp. 390-399. [2] D. Shanmugapriya and P. Ganapathi, "A survey of biometric keystroke dynamics: Approaches, security and challenges," arXiv preprint arXiv:0910.0817, 2009. [3] S. Azenkot, et al., “PassChords: secure multi-touch authentication for blind people,” in Proc. of the 14th international ACM SIGACCESS conference on Computers and accessibility, Oct 2012.
  • 7. Int J Elec & Comp Eng ISSN: 2088-8708  The Security Challenges of the Rhythmprint Authentication (Nakinthorn Wongnarukane) 1287 [4] M. Antal, Z.S. LĂĄszlĂł and L. Izabella, “Keystroke dynamics on android platform,” in Procedia Technology, 2015. [5] T. Takada and Y. Kokubun, “Extended pin authentication scheme allowing multi-touch key input,” in Proc. of International Conference on Advances in Mobile Computing & Multimedia, Dec 2013. [6] X. Huang, G. Lund and A. Sapeluk, “Development of a typing behaviour recognition mechanism on Android”, In 2012 IEEE 11th International Conference on Trust, Security and Pri-vacy in Computing and Communications, IEEE, Jun 2012. BIOGRAPHIES OF AUTHORS Nakinthorn Wongnarukane. Received his B.S. in computer science from Kasetsart University and M.E. degrees in computer science from National Institute of Development Administration (NIDA) in 2010 and 2012. He started studying in Ph.D. in 2015 at National Institute of Development Administration in computer science. His research interests are information security and mobile application. Assistant Professor Dr. Pramote Kuacharoen. Received his B.S. and M.E. degrees in computer and systems engineering from Rensselaer Polytechnic Institute (RPI) in 1995 and 1996, respectively. He also received his M.S. and Ph.D. degrees in electrical and computer engineering from the Georgia Institute of Technology in 2001 and 2004, respectively. He joined the Department of Computer Science at National Institute of Development Administration in 2004. His research interests include computer and network security, information security, computer networks, embedded systems, and mobile applications design and development.