Steganography is the art of hiding data in a seemingly innocuous cover medium. For example – any sensitive data can be hidden inside a digital image. Steganography provides better security than cryptography because cryptography hides the contents of the message but not the existence of the message. So no one apart from the authorized sender and receiver will be aware of the existence of the secret data. Steganographic messages are often first encrypted by some traditional means and then a cover image is modified in some way to contain the encrypted message. The detection of steganographically encoded packages is called steganalysis. In this paper, we propose three efficient Steganography techniques that are used for hiding secret messages. They are LSB based Steganography, Steganography using the last two significant bits and Steganography using diagonal pixels of the image. Symmetric and asymmetric key cryptography has been used to encrypt the message.
Influencing policy (training slides from Fast Track Impact)
Data hiding in graphical password authentication using combination
1. NURUL NADZIRAH BT ADNAN
BTBL 17047005
KRK 5
PROF. MADYA DR. ZARINA BT
MOHAMAD
2. Data hiding in graphical password
authentication using combination zero-
knowledge protocol and
steganography
3. Introduction / project background
• Authentication can be divided into two categories which is message
authentication and entity authentication[1]
• User authentication system is the most common entity authentication system
implemented and used for decades[2]. And user authentication mechanisms are
currently categorized into three main types:
4. • Graphical User Authentication (GUA) is an authentication using Graphical or
Picture as password.
• Authentication Techniques are categorized into three groups which are Pure
Recall Based, Cued Recall Based and Recognition Based [3]. All these
techniques are of the same concept, in which authenticate user by Graphical
based technique
5. Problem statement
• Security and usability problems associated with alphanumeric
passwords as “the password problem” (Wiedenbeck, Waters,
Birget, Broditskiy & Memon, 2007).[5] The problem arises
because passwords are expected to comply with two
fundamentally conflicting requirements:
1) Textual passwords should be easy to remember, and the user
authentication protocol should be executable quickly and
easily by humans[1]
2) Passwords should be secure, i.e., they should look random
and should be hard to guess; they also should be changed
frequently, and should be different on different accounts of
the same user; they should not be written down or stored in
plain text.
6. • However, a strong textual password is hard to memorize and recollect.
Therefore, users tend to choose passwords that are either short or from the
dictionary, rather than random alphanumeric strings. Even worse, it is not
a rare case that users may use only one username and password for
multiple accounts.[3]
7. Objective
To propose the combination of the zero-knowledge protocol and steganography
techniques in the graphical password to provide the authentication and confidentiality of
the data.
To design an improved version of GUAS method with combination steganography and
zero-knowledge protocol.
To implement an authentication approach based on graphical password using zero-
knowledge protocol and steganography.
8. Scope
User
• Develop a user authentication system based on graphical scheme that is more user
friendly.
System
• Proposing an improved Graphical User Authentication (GUAS) algorithm with
steganography while balance the trade-off between level of security, usability and
reliability.
• Implement the usability features in Graphical Password Prototype System for the
authentication.
9. • To overcome the disadvantages of textual password, we proposed the graphical
password in a authentication sector as a real time scenario with additional of
steganography
• If the user have login in one pc, user cannot login in another pc until he/she logout the
system.
Limitation
10. Literature review
Methods/ techniques Description Example
1. Steganography
Advance Encryption
Standard (AES) algorithm
Circular Least Significant
Bit (LSB) algorithm
Satwinder Sigh & Varinder
Kaur Attri 2015 ( “Dual Layer
Security on Data using LSB &
AES” ) [11]
• AES is a symmetric-key algorithm which means
that same key is used for both decryption and
encryption of data.
• LSB works by replacing the least significant bit
of the Pixel value of the cover image (in most of
the cases 8th bit is replaced).
11. Techniques Usability
Authentication process Memorability Example
2. D'ej'a Vu
Sonkar S.K., Paikrao R.L.,
Awadesh Kumar, Graphical
Password Authentication
Based On Color Image 2005
[10]
choosing pictures
among the set of
pictures. These pictures
are presented in a
random manner
Each picture is derived from
an initial seed and no need to
store the pictures pixel by
pixel so only the seeds need to
be stored in the server.
Therefore an authentication
server does not need to store
the whole picture, it simple
needs to store the initial seed
3. Passface algorithm
Grinal Tuscano, Aakriti
TulasyanJournal of
Engineering Research and
Applications Vol. 5, Issues
3, (Part 5)March 2015[9]
asked to choose a
certain number of
images of human faces
from the picture
database
user recognizes and clicks on
the known face
12. 6. PassPoint (Wieden-
2017)[5]
7. Cued Click Points
(Chiasson)[5]
8. Blonder (GregE- 2017)
[5]
Click on several preregistered
locations of a picture in the right
sequence
Can be easy to
remember the image
4. Draw-a-Secret (DAS)
algorithm
(Jermyn in 2012)[1]
User draw a graph on a 2D grid Drawing sequence is
easy to remember
5. Grid selection
algorithm
Abinaya1, Prabha T2,
Sudha C3 “A Shoulder
Surfing Resistant Graphical
Authentication System ”
June 2018 [2]
They zoom in and create the
secret as per the original DAS
scheme. The location of the
chosen drawing grid adds an
extra degree of complexity to the
password as there are thousands
of possible drawing grids within
the selection grid.
This technique in
theory could
significantly increase
the password space
by adding up to 16
bits to the password
space.
13. 9. CD GPS
“Recall Based
Authentication System-
An Overview”) by P.
Baby Maruthi1, Dr. K.
Sandhya Rani2 2017[3]
Choose image on a set of
images and draw a secret on
image.
Drawing a secret
on image is easy
to remember
10. Passmatrix
Deepika C4 and Kokila
R5 “A Shoulder Surfing
Resistant Graphical
Authentication System ”
in Asian Journal of
Applied Science and
Tech (AJAST)v2018[2]
Choose image cell as password
after image has spitted into 7*11
matrix. It have three modules.
1. Image Discretization
Module
2. Horizontal And Vertical
Axis Control Module
3. Login Indicator Generator
Module
select a password
using horizontal
and vertical scroll
bars
14. Expected result
• Increase the security
protocol during the
authentication phase.
• Avoid the shoulder
surfing resistant or
bruteforce attack from
the hackers or attackers.
15. Gantt chart
Task FYP1 W1 W2 W3 W4 W5 W6 W7 W8 W9 W10 W11 W12 W13 W14
Project Title Proposal
Research
Proposal Presentation
Development of
Methodology
Report Drafting of Proposal
Final Presentation
Report Submission
16. [1] Keerthana M.M1, Archana MR2 “ Implementation of Graphical Authentication System for Shoulder
Surfing Attack” in International Journal of Innovative Research in Computer and Communication
Engineering (A High Impact Factor, Monthly, Peer Reviewed Journal) Vol. 6, Issue 2, February 2018.
[2] G Abinaya1, Prabha T2, Sudha C3, Deepika C4 and Kokila R5 “A Shoulder Surfing Resistant Graphical
Authentication System ” in Asian Journal of Applied Science and Technology (AJAST) (Open Access
Quarterly International Journal) Volume 2, Issue 2, Pages 549-556, April- June 2018.
[3] “Recall Based Authentication System- An Overview” in International Conference on Innovative Applications in
Engineering and Information Technology(ICIAEIT-2017) by P. Baby Maruthi1, Dr. K. Sandhya Rani2
[4] Advances in Information Science and Applications - Volume I (2017) “GPIP: A new Graphical Password
based on Image Portions” by Arash Habibi Lashkari Postgraduate Center of Studies (PGC), Limkokwing
University of creative technology (LUCT), Cyberjaya, Malaysia.
References
17. [5] S.Wiedenbeck, J.Waters, J. Birget, A. Brodskiy, and N. Memon, “PassPoints: Design and longitudinal evaluation of
a graphical password system,” International Journal of HumanComputer Studies, 2007.
[6] “Recall Based Authentication System- An Overview” in International Conference on Innovative Applications in
Engineering and Information Technology(ICIAEIT-2017) by P. Baby Maruthi1, Dr. K. Sandhya Rani2
[7] “Advanced Encryption Standard”, Douglas Selent, Rivier Academic Journal, Volume 6, Number 2, Fall 2010.
[8] Bin Li, Junhui He, Jiwu Huang, Yun Qing Shi. A survey on Image steganography and steganalysis, Volume 2,
Number 2, April 2011.
[9] Ms. Grinal Tuscano, Aakriti Tulasyan, Akshata Shetty, Malvina Rumao, AIshwarya Shetty, Graphical Password
Authentication using Passfaces, Int. Journal of Engineering Research and Applications, ISSN 2248-9622, Vol. 5,
Issues 3, (Part 5)March 2015, pp.60-64.
[10] Sonkar S.K., Paikrao R.L., Awadesh Kumar, Graphical Password Authentication Scheme Based On Color Image
Gallery, International Journal of Engineering and Innovative Technology (IJEIT) Volum2, Issue 4, October 2012
[11] Satwinder Sigh & Varinder Kaur Attri 2015 “Dual Layer Security of data using LSB Image Steganography Method
and AES Encryption Algorithm ” .
20. System Architecture
System architecture is a conceptual model that defines the structure, behavior and more views of a
system; an architecture description is a formal description and representation of a system, organized
in a way that supports reasoning about the structures and behaviours of the system.
User Registration
• User enters complete details in form.( eg username, email, phone_number, first_name, last_name )
• View and select the images.
• Hash tags are created in the images
• Everything stored in database.
Login process
• User gives user id and request for OTP.
• Receives OTP.
• View images that choosen from the registration process.
• Generates password and string.
• Create hash
• Comparison hash
• If pass, it will direct to home page and if not it will display error message.
21. From the user perspective, the graphical password
authentication will work like this flowchart.
23. D'ej'a Vu
Choosing pictures among the set of arts or abstract
pictures. These pictures are presented in a random manner
and we will have to choose it.
24. Least Significant Bit (LSB)
• Most commonly used to hide text or an image within a “stego image”
• One of the popular methods of steganography (LSB algorithm) which is the simplest technique to embed the
secret image data into the cover image by exchanging the least significant bit in odd bytes of the cover image
to hide bits from the secret image.
Why use the LSB?
• Human observe will be unable to distinguish between the original image and the stego image.
Steganography algorithm
25. There are several types of segmentation
images, one of this type is segment image
based on the bytes. In flowchart, it explain
about segmentation through the LSB
algorithm is applied, and it is expected that the
groups of bytes in the cover image submit
mixture distributions. After obtaining the
mixture distribution of bytes group for each
original and secret image, the next step is to
embed the secret image bytes into the original
image bytes. The following steps describe
how the proposed model works: