SlideShare a Scribd company logo
 NURUL NADZIRAH BT ADNAN
 BTBL 17047005
 KRK 5
 PROF. MADYA DR. ZARINA BT
MOHAMAD
Data hiding in graphical password
authentication using combination zero-
knowledge protocol and
steganography
Introduction / project background
• Authentication can be divided into two categories which is message
authentication and entity authentication[1]
• User authentication system is the most common entity authentication system
implemented and used for decades[2]. And user authentication mechanisms are
currently categorized into three main types:
• Graphical User Authentication (GUA) is an authentication using Graphical or
Picture as password.
• Authentication Techniques are categorized into three groups which are Pure
Recall Based, Cued Recall Based and Recognition Based [3]. All these
techniques are of the same concept, in which authenticate user by Graphical
based technique
Problem statement
• Security and usability problems associated with alphanumeric
passwords as “the password problem” (Wiedenbeck, Waters,
Birget, Broditskiy & Memon, 2007).[5] The problem arises
because passwords are expected to comply with two
fundamentally conflicting requirements:
1) Textual passwords should be easy to remember, and the user
authentication protocol should be executable quickly and
easily by humans[1]
2) Passwords should be secure, i.e., they should look random
and should be hard to guess; they also should be changed
frequently, and should be different on different accounts of
the same user; they should not be written down or stored in
plain text.
• However, a strong textual password is hard to memorize and recollect.
Therefore, users tend to choose passwords that are either short or from the
dictionary, rather than random alphanumeric strings. Even worse, it is not
a rare case that users may use only one username and password for
multiple accounts.[3]
Objective
To propose the combination of the zero-knowledge protocol and steganography
techniques in the graphical password to provide the authentication and confidentiality of
the data.
To design an improved version of GUAS method with combination steganography and
zero-knowledge protocol.
To implement an authentication approach based on graphical password using zero-
knowledge protocol and steganography.
Scope
User
• Develop a user authentication system based on graphical scheme that is more user
friendly.
System
• Proposing an improved Graphical User Authentication (GUAS) algorithm with
steganography while balance the trade-off between level of security, usability and
reliability.
• Implement the usability features in Graphical Password Prototype System for the
authentication.
• To overcome the disadvantages of textual password, we proposed the graphical
password in a authentication sector as a real time scenario with additional of
steganography
• If the user have login in one pc, user cannot login in another pc until he/she logout the
system.
Limitation
Literature review
Methods/ techniques Description Example
1. Steganography
Advance Encryption
Standard (AES) algorithm
Circular Least Significant
Bit (LSB) algorithm
Satwinder Sigh & Varinder
Kaur Attri 2015 ( “Dual Layer
Security on Data using LSB &
AES” ) [11]
• AES is a symmetric-key algorithm which means
that same key is used for both decryption and
encryption of data.
• LSB works by replacing the least significant bit
of the Pixel value of the cover image (in most of
the cases 8th bit is replaced).
Techniques Usability
Authentication process Memorability Example
2. D'ej'a Vu
Sonkar S.K., Paikrao R.L.,
Awadesh Kumar, Graphical
Password Authentication
Based On Color Image 2005
[10]
choosing pictures
among the set of
pictures. These pictures
are presented in a
random manner
Each picture is derived from
an initial seed and no need to
store the pictures pixel by
pixel so only the seeds need to
be stored in the server.
Therefore an authentication
server does not need to store
the whole picture, it simple
needs to store the initial seed
3. Passface algorithm
Grinal Tuscano, Aakriti
TulasyanJournal of
Engineering Research and
Applications Vol. 5, Issues
3, (Part 5)March 2015[9]
asked to choose a
certain number of
images of human faces
from the picture
database
user recognizes and clicks on
the known face
6. PassPoint (Wieden-
2017)[5]
7. Cued Click Points
(Chiasson)[5]
8. Blonder (GregE- 2017)
[5]
Click on several preregistered
locations of a picture in the right
sequence
Can be easy to
remember the image
4. Draw-a-Secret (DAS)
algorithm
(Jermyn in 2012)[1]
User draw a graph on a 2D grid Drawing sequence is
easy to remember
5. Grid selection
algorithm
Abinaya1, Prabha T2,
Sudha C3 “A Shoulder
Surfing Resistant Graphical
Authentication System ”
June 2018 [2]
They zoom in and create the
secret as per the original DAS
scheme. The location of the
chosen drawing grid adds an
extra degree of complexity to the
password as there are thousands
of possible drawing grids within
the selection grid.
This technique in
theory could
significantly increase
the password space
by adding up to 16
bits to the password
space.
9. CD GPS
“Recall Based
Authentication System-
An Overview”) by P.
Baby Maruthi1, Dr. K.
Sandhya Rani2 2017[3]
Choose image on a set of
images and draw a secret on
image.
Drawing a secret
on image is easy
to remember
10. Passmatrix
Deepika C4 and Kokila
R5 “A Shoulder Surfing
Resistant Graphical
Authentication System ”
in Asian Journal of
Applied Science and
Tech (AJAST)v2018[2]
Choose image cell as password
after image has spitted into 7*11
matrix. It have three modules.
1. Image Discretization
Module
2. Horizontal And Vertical
Axis Control Module
3. Login Indicator Generator
Module
select a password
using horizontal
and vertical scroll
bars
Expected result
• Increase the security
protocol during the
authentication phase.
• Avoid the shoulder
surfing resistant or
bruteforce attack from
the hackers or attackers.
Gantt chart
Task FYP1 W1 W2 W3 W4 W5 W6 W7 W8 W9 W10 W11 W12 W13 W14
Project Title Proposal
Research
Proposal Presentation
Development of
Methodology
Report Drafting of Proposal
Final Presentation
Report Submission
[1] Keerthana M.M1, Archana MR2 “ Implementation of Graphical Authentication System for Shoulder
Surfing Attack” in International Journal of Innovative Research in Computer and Communication
Engineering (A High Impact Factor, Monthly, Peer Reviewed Journal) Vol. 6, Issue 2, February 2018.
[2] G Abinaya1, Prabha T2, Sudha C3, Deepika C4 and Kokila R5 “A Shoulder Surfing Resistant Graphical
Authentication System ” in Asian Journal of Applied Science and Technology (AJAST) (Open Access
Quarterly International Journal) Volume 2, Issue 2, Pages 549-556, April- June 2018.
[3] “Recall Based Authentication System- An Overview” in International Conference on Innovative Applications in
Engineering and Information Technology(ICIAEIT-2017) by P. Baby Maruthi1, Dr. K. Sandhya Rani2
[4] Advances in Information Science and Applications - Volume I (2017) “GPIP: A new Graphical Password
based on Image Portions” by Arash Habibi Lashkari Postgraduate Center of Studies (PGC), Limkokwing
University of creative technology (LUCT), Cyberjaya, Malaysia.
References
[5] S.Wiedenbeck, J.Waters, J. Birget, A. Brodskiy, and N. Memon, “PassPoints: Design and longitudinal evaluation of
a graphical password system,” International Journal of HumanComputer Studies, 2007.
[6] “Recall Based Authentication System- An Overview” in International Conference on Innovative Applications in
Engineering and Information Technology(ICIAEIT-2017) by P. Baby Maruthi1, Dr. K. Sandhya Rani2
[7] “Advanced Encryption Standard”, Douglas Selent, Rivier Academic Journal, Volume 6, Number 2, Fall 2010.
[8] Bin Li, Junhui He, Jiwu Huang, Yun Qing Shi. A survey on Image steganography and steganalysis, Volume 2,
Number 2, April 2011.
[9] Ms. Grinal Tuscano, Aakriti Tulasyan, Akshata Shetty, Malvina Rumao, AIshwarya Shetty, Graphical Password
Authentication using Passfaces, Int. Journal of Engineering Research and Applications, ISSN 2248-9622, Vol. 5,
Issues 3, (Part 5)March 2015, pp.60-64.
[10] Sonkar S.K., Paikrao R.L., Awadesh Kumar, Graphical Password Authentication Scheme Based On Color Image
Gallery, International Journal of Engineering and Innovative Technology (IJEIT) Volum2, Issue 4, October 2012
[11] Satwinder Sigh & Varinder Kaur Attri 2015 “Dual Layer Security of data using LSB Image Steganography Method
and AES Encryption Algorithm ” .
Figure above shows the framework about user authentication
System Architecture
System architecture is a conceptual model that defines the structure, behavior and more views of a
system; an architecture description is a formal description and representation of a system, organized
in a way that supports reasoning about the structures and behaviours of the system.
User Registration
• User enters complete details in form.( eg username, email, phone_number, first_name, last_name )
• View and select the images.
• Hash tags are created in the images
• Everything stored in database.
Login process
• User gives user id and request for OTP.
• Receives OTP.
• View images that choosen from the registration process.
• Generates password and string.
• Create hash
• Comparison hash
• If pass, it will direct to home page and if not it will display error message.
From the user perspective, the graphical password
authentication will work like this flowchart.
Figure above shows use case diagram user
D'ej'a Vu
Choosing pictures among the set of arts or abstract
pictures. These pictures are presented in a random manner
and we will have to choose it.
Least Significant Bit (LSB)
• Most commonly used to hide text or an image within a “stego image”
• One of the popular methods of steganography (LSB algorithm) which is the simplest technique to embed the
secret image data into the cover image by exchanging the least significant bit in odd bytes of the cover image
to hide bits from the secret image.
Why use the LSB?
• Human observe will be unable to distinguish between the original image and the stego image.
Steganography algorithm
There are several types of segmentation
images, one of this type is segment image
based on the bytes. In flowchart, it explain
about segmentation through the LSB
algorithm is applied, and it is expected that the
groups of bytes in the cover image submit
mixture distributions. After obtaining the
mixture distribution of bytes group for each
original and secret image, the next step is to
embed the secret image bytes into the original
image bytes. The following steps describe
how the proposed model works:
Proof of concept
Proof of concept

More Related Content

Similar to Data hiding in graphical password authentication using combination

A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
IOSR Journals
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password schemeIAEME Publication
 
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
IRJET Journal
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
IJCSIS Research Publications
 
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
IJNSA Journal
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image Segmentation
IRJET Journal
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password System
IJNSA Journal
 
Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...
NurrulHafizza
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
IRJET Journal
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
eSAT Publishing House
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
IJERA Editor
 
3 d password
3 d password3 d password
3 d password
Izhar Cheema
 
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image PasswordResearch Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Password
ijtsrd
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
IRJET Journal
 
Ai4506179185
Ai4506179185Ai4506179185
Ai4506179185
IJERA Editor
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
ranjit banshpal
 
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System             IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET Journal
 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Scheme
paperpublications3
 
Hardware Design Practices For Modern Hardware
Hardware Design Practices For Modern HardwareHardware Design Practices For Modern Hardware
Hardware Design Practices For Modern Hardware
Winstina Kennedy
 

Similar to Data hiding in graphical password authentication using combination (20)

A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
 
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image Segmentation
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password System
 
Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
 
3 d password
3 d password3 d password
3 d password
 
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image PasswordResearch Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Password
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Ai4506179185
Ai4506179185Ai4506179185
Ai4506179185
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
 
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System             IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Scheme
 
Hardware Design Practices For Modern Hardware
Hardware Design Practices For Modern HardwareHardware Design Practices For Modern Hardware
Hardware Design Practices For Modern Hardware
 

Recently uploaded

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 

Recently uploaded (20)

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 

Data hiding in graphical password authentication using combination

  • 1.  NURUL NADZIRAH BT ADNAN  BTBL 17047005  KRK 5  PROF. MADYA DR. ZARINA BT MOHAMAD
  • 2. Data hiding in graphical password authentication using combination zero- knowledge protocol and steganography
  • 3. Introduction / project background • Authentication can be divided into two categories which is message authentication and entity authentication[1] • User authentication system is the most common entity authentication system implemented and used for decades[2]. And user authentication mechanisms are currently categorized into three main types:
  • 4. • Graphical User Authentication (GUA) is an authentication using Graphical or Picture as password. • Authentication Techniques are categorized into three groups which are Pure Recall Based, Cued Recall Based and Recognition Based [3]. All these techniques are of the same concept, in which authenticate user by Graphical based technique
  • 5. Problem statement • Security and usability problems associated with alphanumeric passwords as “the password problem” (Wiedenbeck, Waters, Birget, Broditskiy & Memon, 2007).[5] The problem arises because passwords are expected to comply with two fundamentally conflicting requirements: 1) Textual passwords should be easy to remember, and the user authentication protocol should be executable quickly and easily by humans[1] 2) Passwords should be secure, i.e., they should look random and should be hard to guess; they also should be changed frequently, and should be different on different accounts of the same user; they should not be written down or stored in plain text.
  • 6. • However, a strong textual password is hard to memorize and recollect. Therefore, users tend to choose passwords that are either short or from the dictionary, rather than random alphanumeric strings. Even worse, it is not a rare case that users may use only one username and password for multiple accounts.[3]
  • 7. Objective To propose the combination of the zero-knowledge protocol and steganography techniques in the graphical password to provide the authentication and confidentiality of the data. To design an improved version of GUAS method with combination steganography and zero-knowledge protocol. To implement an authentication approach based on graphical password using zero- knowledge protocol and steganography.
  • 8. Scope User • Develop a user authentication system based on graphical scheme that is more user friendly. System • Proposing an improved Graphical User Authentication (GUAS) algorithm with steganography while balance the trade-off between level of security, usability and reliability. • Implement the usability features in Graphical Password Prototype System for the authentication.
  • 9. • To overcome the disadvantages of textual password, we proposed the graphical password in a authentication sector as a real time scenario with additional of steganography • If the user have login in one pc, user cannot login in another pc until he/she logout the system. Limitation
  • 10. Literature review Methods/ techniques Description Example 1. Steganography Advance Encryption Standard (AES) algorithm Circular Least Significant Bit (LSB) algorithm Satwinder Sigh & Varinder Kaur Attri 2015 ( “Dual Layer Security on Data using LSB & AES” ) [11] • AES is a symmetric-key algorithm which means that same key is used for both decryption and encryption of data. • LSB works by replacing the least significant bit of the Pixel value of the cover image (in most of the cases 8th bit is replaced).
  • 11. Techniques Usability Authentication process Memorability Example 2. D'ej'a Vu Sonkar S.K., Paikrao R.L., Awadesh Kumar, Graphical Password Authentication Based On Color Image 2005 [10] choosing pictures among the set of pictures. These pictures are presented in a random manner Each picture is derived from an initial seed and no need to store the pictures pixel by pixel so only the seeds need to be stored in the server. Therefore an authentication server does not need to store the whole picture, it simple needs to store the initial seed 3. Passface algorithm Grinal Tuscano, Aakriti TulasyanJournal of Engineering Research and Applications Vol. 5, Issues 3, (Part 5)March 2015[9] asked to choose a certain number of images of human faces from the picture database user recognizes and clicks on the known face
  • 12. 6. PassPoint (Wieden- 2017)[5] 7. Cued Click Points (Chiasson)[5] 8. Blonder (GregE- 2017) [5] Click on several preregistered locations of a picture in the right sequence Can be easy to remember the image 4. Draw-a-Secret (DAS) algorithm (Jermyn in 2012)[1] User draw a graph on a 2D grid Drawing sequence is easy to remember 5. Grid selection algorithm Abinaya1, Prabha T2, Sudha C3 “A Shoulder Surfing Resistant Graphical Authentication System ” June 2018 [2] They zoom in and create the secret as per the original DAS scheme. The location of the chosen drawing grid adds an extra degree of complexity to the password as there are thousands of possible drawing grids within the selection grid. This technique in theory could significantly increase the password space by adding up to 16 bits to the password space.
  • 13. 9. CD GPS “Recall Based Authentication System- An Overview”) by P. Baby Maruthi1, Dr. K. Sandhya Rani2 2017[3] Choose image on a set of images and draw a secret on image. Drawing a secret on image is easy to remember 10. Passmatrix Deepika C4 and Kokila R5 “A Shoulder Surfing Resistant Graphical Authentication System ” in Asian Journal of Applied Science and Tech (AJAST)v2018[2] Choose image cell as password after image has spitted into 7*11 matrix. It have three modules. 1. Image Discretization Module 2. Horizontal And Vertical Axis Control Module 3. Login Indicator Generator Module select a password using horizontal and vertical scroll bars
  • 14. Expected result • Increase the security protocol during the authentication phase. • Avoid the shoulder surfing resistant or bruteforce attack from the hackers or attackers.
  • 15. Gantt chart Task FYP1 W1 W2 W3 W4 W5 W6 W7 W8 W9 W10 W11 W12 W13 W14 Project Title Proposal Research Proposal Presentation Development of Methodology Report Drafting of Proposal Final Presentation Report Submission
  • 16. [1] Keerthana M.M1, Archana MR2 “ Implementation of Graphical Authentication System for Shoulder Surfing Attack” in International Journal of Innovative Research in Computer and Communication Engineering (A High Impact Factor, Monthly, Peer Reviewed Journal) Vol. 6, Issue 2, February 2018. [2] G Abinaya1, Prabha T2, Sudha C3, Deepika C4 and Kokila R5 “A Shoulder Surfing Resistant Graphical Authentication System ” in Asian Journal of Applied Science and Technology (AJAST) (Open Access Quarterly International Journal) Volume 2, Issue 2, Pages 549-556, April- June 2018. [3] “Recall Based Authentication System- An Overview” in International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017) by P. Baby Maruthi1, Dr. K. Sandhya Rani2 [4] Advances in Information Science and Applications - Volume I (2017) “GPIP: A new Graphical Password based on Image Portions” by Arash Habibi Lashkari Postgraduate Center of Studies (PGC), Limkokwing University of creative technology (LUCT), Cyberjaya, Malaysia. References
  • 17. [5] S.Wiedenbeck, J.Waters, J. Birget, A. Brodskiy, and N. Memon, “PassPoints: Design and longitudinal evaluation of a graphical password system,” International Journal of HumanComputer Studies, 2007. [6] “Recall Based Authentication System- An Overview” in International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017) by P. Baby Maruthi1, Dr. K. Sandhya Rani2 [7] “Advanced Encryption Standard”, Douglas Selent, Rivier Academic Journal, Volume 6, Number 2, Fall 2010. [8] Bin Li, Junhui He, Jiwu Huang, Yun Qing Shi. A survey on Image steganography and steganalysis, Volume 2, Number 2, April 2011. [9] Ms. Grinal Tuscano, Aakriti Tulasyan, Akshata Shetty, Malvina Rumao, AIshwarya Shetty, Graphical Password Authentication using Passfaces, Int. Journal of Engineering Research and Applications, ISSN 2248-9622, Vol. 5, Issues 3, (Part 5)March 2015, pp.60-64. [10] Sonkar S.K., Paikrao R.L., Awadesh Kumar, Graphical Password Authentication Scheme Based On Color Image Gallery, International Journal of Engineering and Innovative Technology (IJEIT) Volum2, Issue 4, October 2012 [11] Satwinder Sigh & Varinder Kaur Attri 2015 “Dual Layer Security of data using LSB Image Steganography Method and AES Encryption Algorithm ” .
  • 18.
  • 19. Figure above shows the framework about user authentication
  • 20. System Architecture System architecture is a conceptual model that defines the structure, behavior and more views of a system; an architecture description is a formal description and representation of a system, organized in a way that supports reasoning about the structures and behaviours of the system. User Registration • User enters complete details in form.( eg username, email, phone_number, first_name, last_name ) • View and select the images. • Hash tags are created in the images • Everything stored in database. Login process • User gives user id and request for OTP. • Receives OTP. • View images that choosen from the registration process. • Generates password and string. • Create hash • Comparison hash • If pass, it will direct to home page and if not it will display error message.
  • 21. From the user perspective, the graphical password authentication will work like this flowchart.
  • 22. Figure above shows use case diagram user
  • 23. D'ej'a Vu Choosing pictures among the set of arts or abstract pictures. These pictures are presented in a random manner and we will have to choose it.
  • 24. Least Significant Bit (LSB) • Most commonly used to hide text or an image within a “stego image” • One of the popular methods of steganography (LSB algorithm) which is the simplest technique to embed the secret image data into the cover image by exchanging the least significant bit in odd bytes of the cover image to hide bits from the secret image. Why use the LSB? • Human observe will be unable to distinguish between the original image and the stego image. Steganography algorithm
  • 25. There are several types of segmentation images, one of this type is segment image based on the bytes. In flowchart, it explain about segmentation through the LSB algorithm is applied, and it is expected that the groups of bytes in the cover image submit mixture distributions. After obtaining the mixture distribution of bytes group for each original and secret image, the next step is to embed the secret image bytes into the original image bytes. The following steps describe how the proposed model works:
  • 27.
  • 28.