SlideShare a Scribd company logo
1 of 1
Download to read offline
DATA HIDING IN IMAGE-BASED AUTHENTICATION USING
COMBINATION OF
ZERO-KNOWLEDGE PROTOCOL AND STEGANOGRAPHY
NAME: NURUL NADZIRAH BT ADNAN
MATRIC NUMBER: BTBL 17047005
SUPERVISOR NAME: PROF. MADYA DR.ZARINA BT
MOHAMAD
PROGRAM: BACHELOR OF COMPUTER SCIENCE (NETWORK
SECURITY) WITH HONOUR
ABSTRACT / RESEARCH BACKGROUND
One other most important aspects in information security nowadays is to understand when creating or improving the website’s login procedure or
known as user authentication. Users are usually identified with a user ID, and authentication is accomplished when the user provides a credential, for
example a password, that matches with that user ID. The concept that is normally use to secure or authenticate the system is the simple text-based
passwords. But, it is not secure enough and a burden on the user to remember. There is an alternative solution to these which is Graphical User
Authentication (GUA) or imaged-based authentication. This is because humans are good at recognizing images rather than remembering password.
This type of approach help user to create and memorize passwords easily. So, the combination of zero-knowledge protocol and steganography been
implemented with the GUA to make a better approach. The implemented algorithm has higher resistance toward shoulder surfing attack compare to
existed algorithm or method. From this alternative algorithm, proved that Graphical User Authentication with combination of zero-knowledge and
steganography is much better that the text-based authentication in term of usability and security.
PROBLEM STATEMENT
The problem arises because passwords are expected to comply with two
fundamentally conflicting requirements:
 Passwords should be easy to remember, and the user authentication
protocol should be executable quickly and easily by humans [5, 6].
 Passwords should be secure for example, they should look random
and should be hard to guess, they should be changed frequently, and
should be different on different accounts of the same user; they
should not be written down or stored in plain text [5].
OBJECTIVE
 To propose the combination of the zero-knowledge protocol and
steganography techniques in the graphical password to provide the
authentication and confidentiality of the data [8].
 To design an improved version of GUAS method with combination
steganography and zero-knowledge protocol that able to achieve
balance between the aspect of security, usability and reliability [9].
 To implement an authentication approach based on graphical password
using zero-knowledge and steganography. (To test the secure graphical
password compared to text-based.)
CONCLUSION
Most of the existing authentication system has certain drawbacks for that
reason of text-based passwords. Meanwhile, GUA are most preferable
authentication system where users have to choose the images to
authenticate themselves. As authentication techniques generate passwords
it also need to resist the shoulder attack. The implemented of
steganography and zero-knowledge in GUA make much better solution in
user authentication in term of security.
FUTURE WORKS
 So researchers of modern days have gone through different alternative
methods and concluded that graphical passwords are most preferable
authentication system.
 By implementing encryption algorithms and hashing for storing and
retrieving pictures and data, one can achieve another level of security.
RESULTS
REFERENCES
1. Johnson, N., & Katzenbeisser, S. (2000). A survey of steganographic techniques. Information Hiding, September, 43–78.
2. Thampy, S. M., & Johny, A. (2015). Review on Graphical Password Authentication System.I-Manager’s Journal on Information Technology, 4(1), 33–38.
3. Professor, A. (2018). International Journal of Innovative Research in Computer and Communication Engineering Implementation of Graphical
Authentication System for Shoulder Surfing Attacks. 1082–1090.
4. Rupavathy, N., Carmel Mary Belinda, M. J., & Nivedhitha, G. (2018). A shoulder surfing resistance using graphical authentication system. International
Journal of Engineering and Technology(UAE), 7(1.7 Special Issue 7), 169–174.
5. Singh, K. J., & Chanu, U. S. (2013). Graphical Password or Graphical User Authentication as Effective Password Provider. 2(9), 2765–2769.
6. Vashishtha, L. K., Dutta, T., & Sur, A. (2013). Least significant bit matching steganalysis based on feature analysis. 2013 National Conference on
Communications, NCC 2013.

More Related Content

What's hot

Majar Project Synopsis (1).docx
Majar Project Synopsis (1).docxMajar Project Synopsis (1).docx
Majar Project Synopsis (1).docx
UJJWALPAL15
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
prasanna9
 
A Review on Stegnography Data Hiding using Color Images
A Review on Stegnography Data Hiding using Color ImagesA Review on Stegnography Data Hiding using Color Images
A Review on Stegnography Data Hiding using Color Images
ijtsrd
 
Secure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptographySecure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptography
Maizatul Auni Bt Mazhar
 

What's hot (20)

Majar Project Synopsis (1).docx
Majar Project Synopsis (1).docxMajar Project Synopsis (1).docx
Majar Project Synopsis (1).docx
 
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
 
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
E-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documentsE-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documents
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
 
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWIMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
 
Access Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network RelationshipsAccess Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network Relationships
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Based
 
Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Security for Hard AI Problems Using CaRP Authentication
Security for Hard AI Problems Using CaRP AuthenticationSecurity for Hard AI Problems Using CaRP Authentication
Security for Hard AI Problems Using CaRP Authentication
 
M Tech Projects List
M Tech Projects ListM Tech Projects List
M Tech Projects List
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
 
A Review on Stegnography Data Hiding using Color Images
A Review on Stegnography Data Hiding using Color ImagesA Review on Stegnography Data Hiding using Color Images
A Review on Stegnography Data Hiding using Color Images
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
 
Secure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptographySecure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptography
 

Similar to Fyp2

Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
banda5630
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
ijiert bestjournal
 
Ipas implicit password_authentication_system
Ipas implicit password_authentication_systemIpas implicit password_authentication_system
Ipas implicit password_authentication_system
Sameer Dighe
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
IJCST - ESRG Journals
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
IAEME Publication
 

Similar to Fyp2 (20)

Graphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptxGraphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptx
 
3 d password
3 d password3 d password
3 d password
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Vshantaram
VshantaramVshantaram
Vshantaram
 
Data hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combinationData hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combination
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
 
Review on: Combination of Cryptography and Steganography for Secure File Tran...
Review on: Combination of Cryptography and Steganography for Secure File Tran...Review on: Combination of Cryptography and Steganography for Secure File Tran...
Review on: Combination of Cryptography and Steganography for Secure File Tran...
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
 
Ipas implicit password_authentication_system
Ipas implicit password_authentication_systemIpas implicit password_authentication_system
Ipas implicit password_authentication_system
 
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
 
3D Password PRESENTATION - Copy.pptx
3D Password PRESENTATION - Copy.pptx3D Password PRESENTATION - Copy.pptx
3D Password PRESENTATION - Copy.pptx
 
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESMACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Fyp2

  • 1. DATA HIDING IN IMAGE-BASED AUTHENTICATION USING COMBINATION OF ZERO-KNOWLEDGE PROTOCOL AND STEGANOGRAPHY NAME: NURUL NADZIRAH BT ADNAN MATRIC NUMBER: BTBL 17047005 SUPERVISOR NAME: PROF. MADYA DR.ZARINA BT MOHAMAD PROGRAM: BACHELOR OF COMPUTER SCIENCE (NETWORK SECURITY) WITH HONOUR ABSTRACT / RESEARCH BACKGROUND One other most important aspects in information security nowadays is to understand when creating or improving the website’s login procedure or known as user authentication. Users are usually identified with a user ID, and authentication is accomplished when the user provides a credential, for example a password, that matches with that user ID. The concept that is normally use to secure or authenticate the system is the simple text-based passwords. But, it is not secure enough and a burden on the user to remember. There is an alternative solution to these which is Graphical User Authentication (GUA) or imaged-based authentication. This is because humans are good at recognizing images rather than remembering password. This type of approach help user to create and memorize passwords easily. So, the combination of zero-knowledge protocol and steganography been implemented with the GUA to make a better approach. The implemented algorithm has higher resistance toward shoulder surfing attack compare to existed algorithm or method. From this alternative algorithm, proved that Graphical User Authentication with combination of zero-knowledge and steganography is much better that the text-based authentication in term of usability and security. PROBLEM STATEMENT The problem arises because passwords are expected to comply with two fundamentally conflicting requirements:  Passwords should be easy to remember, and the user authentication protocol should be executable quickly and easily by humans [5, 6].  Passwords should be secure for example, they should look random and should be hard to guess, they should be changed frequently, and should be different on different accounts of the same user; they should not be written down or stored in plain text [5]. OBJECTIVE  To propose the combination of the zero-knowledge protocol and steganography techniques in the graphical password to provide the authentication and confidentiality of the data [8].  To design an improved version of GUAS method with combination steganography and zero-knowledge protocol that able to achieve balance between the aspect of security, usability and reliability [9].  To implement an authentication approach based on graphical password using zero-knowledge and steganography. (To test the secure graphical password compared to text-based.) CONCLUSION Most of the existing authentication system has certain drawbacks for that reason of text-based passwords. Meanwhile, GUA are most preferable authentication system where users have to choose the images to authenticate themselves. As authentication techniques generate passwords it also need to resist the shoulder attack. The implemented of steganography and zero-knowledge in GUA make much better solution in user authentication in term of security. FUTURE WORKS  So researchers of modern days have gone through different alternative methods and concluded that graphical passwords are most preferable authentication system.  By implementing encryption algorithms and hashing for storing and retrieving pictures and data, one can achieve another level of security. RESULTS REFERENCES 1. Johnson, N., & Katzenbeisser, S. (2000). A survey of steganographic techniques. Information Hiding, September, 43–78. 2. Thampy, S. M., & Johny, A. (2015). Review on Graphical Password Authentication System.I-Manager’s Journal on Information Technology, 4(1), 33–38. 3. Professor, A. (2018). International Journal of Innovative Research in Computer and Communication Engineering Implementation of Graphical Authentication System for Shoulder Surfing Attacks. 1082–1090. 4. Rupavathy, N., Carmel Mary Belinda, M. J., & Nivedhitha, G. (2018). A shoulder surfing resistance using graphical authentication system. International Journal of Engineering and Technology(UAE), 7(1.7 Special Issue 7), 169–174. 5. Singh, K. J., & Chanu, U. S. (2013). Graphical Password or Graphical User Authentication as Effective Password Provider. 2(9), 2765–2769. 6. Vashishtha, L. K., Dutta, T., & Sur, A. (2013). Least significant bit matching steganalysis based on feature analysis. 2013 National Conference on Communications, NCC 2013.