Skip to main content
Log in

Images as graphical password: verification and analysis using non-regular low-density parity check coding

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

The use of mobile computing devices like laptops, smartphones, tablets, etc. ease user access to work or connect remotely for performing a number of operations. Also, with the advent of these new technologies and devices, one of the major concerns emerges in the form of security for one’s personal data or information. Passwords are very critical to human safety as he or she could be a victim of unauthorized access, data misuse or even they may face some legal trouble because of unconventional activities. Robust passwords are recommended in this act to avoid various outbreaks. But, these passwords are not easy to remember in most of the cases. Therefore, an effort has been made in this paper to present a new graphical password-based method that verifies a user’s authenticity by using images as a password. In this regard, a two-way password verification system is adopted using non-regular low-density parity-check codes and an encryption methodology. The performance of the proposed work was evaluated for three different cases i.e. (a) To validate image for about thirteen of modifications (b) To validate image for different format conversion, and (c) Similarity measures for different face images taken from labeled faces in the wild (LFW) database. Results validated the performance of the proposed method when compared with other state-of-the-art approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Availability of data and material

Not applicable.

Code availability

Appended at the last.

References

  1. Lin Y, Varodayan D, Girod B (2012) Image authentication using distributed source coding. IEEE Trans Image Process 21(1):273–283. https://doi.org/10.1109/TIP.2011.2157515

    Article  MathSciNet  MATH  Google Scholar 

  2. Tabatabaei SAH, Rehman OU, Zivic N, Ruland C (2015) Secure and robust two-phase image authentication. IEEE Trans Multimed 17(7):945–956. https://doi.org/10.1109/TMM.2015.2432672

    Article  Google Scholar 

  3. Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprint and face recognition. IEEE Trans Image Process 23(2):710–724. https://doi.org/10.1109/TIP.2013.2292332

    Article  MathSciNet  MATH  Google Scholar 

  4. Li X, Sun X, Liu Q (2015) Image integrity authentication scheme based on fixed point theory. IEEE Trans Image Process 24(2):632–645. https://doi.org/10.1109/tip.2014.2372473

    Article  MathSciNet  MATH  Google Scholar 

  5. Bianchi A, Oakley I, Kim H (2016) PassBYOP: bring your own picture for securing graphical passwords. IEEE Trans Hum Mach Syst 46(3):380–389. https://doi.org/10.1109/THMS.2015.2487511

    Article  Google Scholar 

  6. Guo G, Wen L, Yan S (2014) Face authentication with makeup changes. IEEE Trans Circuits Syst Video Technol 24(5):814–825. https://doi.org/10.1109/TCSVT.2013.2280076

    Article  MathSciNet  Google Scholar 

  7. Dubey RK, Goh J, Thing VLL (2016) Fingerprint liveness detection from single image using low-level features and shape analysis. IEEE Trans Inf Forensics Secur 11(7):1461–1475. https://doi.org/10.1109/TIFS.2016.2535899

    Article  Google Scholar 

  8. Sharghi H, Sartipi K (2016) A user behavior-based approach to detect the insider threat in distributed diagnostic imaging systems. IEEE Int Symp Comput Based Med Syst. https://doi.org/10.1109/CBMS.2016.58

    Article  Google Scholar 

  9. Bashar F, Khan A, Ahmed F, Kabir H (2014) Face recognition using similarity pattern of image directional edge response. Adv Electr Comput Eng 14(1):69–76. https://doi.org/10.4316/AECE.2014.01011

    Article  Google Scholar 

  10. Ardizzone E, Bruno A, Mazzola G (2015) Copy-move forgery detection by matching triangles of key points. IEEE Trans Inf Forensics Secur 10(10):2084–2094. https://doi.org/10.1109/TIFS.2015.2445742

    Article  Google Scholar 

  11. Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy–move forgery detection. IEEE Trans Inf Forensics Secur 10(11):2284–2297. https://doi.org/10.1109/TIFS.2015.2455334

    Article  Google Scholar 

  12. Hamad S, Khalifa A, Elhadad A (2014) A blind high-capacity wavelet-based steganography technique for hiding images into other images. Adv Electr Comput Eng 14(2):35–42. https://doi.org/10.4316/AECE.2014.02006

    Article  Google Scholar 

  13. Pande A, Chen S, Mohapatra P, Zambreno J (2014) Hardware architecture for video authentication using sensor pattern noise. IEEE Trans Circuits Syst Video Technol 24(1):157–167. https://doi.org/10.1109/TCSVT.2013.2276869

    Article  Google Scholar 

  14. Battiato S, Farinella GM, Messina E, Puglisi G (2012) Robust image alignment for tampering detection. IEEE Trans Inf Forensics Secur 7(4):1105–1117. https://doi.org/10.1109/TIFS.2012.2194285

    Article  Google Scholar 

  15. Zhao Y, Wang S, Zhang X, Yao H (2013) Robust hashing for image authentication using Zernike moments and local features. IEEE Trans Inf Forensics Secur 8(1):55–63. https://doi.org/10.1109/TIFS.2012.2223680

    Article  Google Scholar 

  16. Korus P, Huang J (2016) Multi-scale fusion for improved localization of malicious tampering in digital images. IEEE Trans Image Process 25(3):1312–1326. https://doi.org/10.1109/TIP.2016.2518870

    Article  MathSciNet  MATH  Google Scholar 

  17. Lee J, Bauer L, Mazurek ML (2015) The effectiveness of security images in internet banking. IEEE Internet Comput 19(1):54–62. https://doi.org/10.1109/MIC.2014.108

    Article  Google Scholar 

  18. Liveris AD, Xiong Z, Georghiades CN (2002) Compression of binary sources with side information at the decoder using LDPC codes. IEEE Commun Lett 6(10):440–442. https://doi.org/10.1109/LCOMM.2002.804244

    Article  Google Scholar 

  19. Popescu AC, Farid H (2005) Exposing digital forgeries in color filter array interpolated images. IEEE Trans Signal Process 53(10):3948–3959. https://doi.org/10.1109/TSP.2005.855406

    Article  MathSciNet  MATH  Google Scholar 

  20. Yeh CH, Lee G, Lin CY (2015) Robust laser speckle authentication system through data mining techniques. IEEE Trans Ind Inf 11(2):505–512. https://doi.org/10.1109/TII.2015.2400411

    Article  Google Scholar 

  21. Smith DF, Wiliem A, Lovell BC (2015) Face recognition on consumer devices: reflections on replay attacks. IEEE Trans Inf Forensics Secur 10(4):736–745. https://doi.org/10.1109/tifs.2015.2398819

    Article  Google Scholar 

  22. Thavalengal Corcoran P (2016) User authentication on smart-phones: focusing on iris biometrics. IEEE Consum Electron Mag 5(2):87–93. https://doi.org/10.1109/MCE.2016.2522018

    Article  Google Scholar 

  23. Bae NS, Memon N (2014) Online signature verification on mobile devices. IEEE Trans Inf Forensics Secur 9(6):933–947. https://doi.org/10.1109/TIFS.2014.2316472

    Article  Google Scholar 

  24. Le N, Retraint F (2019) An improved algorithm for digital image authentication and forgery localization using demosaicing artifacts. IEEE Access 7:125038–125053. https://doi.org/10.1109/ACCESS.2019.2938467

    Article  Google Scholar 

  25. Luan G, Li A, Zhang D, Wang D (2019) Asymmetric image encryption and authentication based on equal modulus decomposition in the Fresnel transform domain. IEEE Photon J 11(1):1–7. https://doi.org/10.1109/JPHOT.2018.2886295

    Article  Google Scholar 

  26. Kumar SBJ, Nair A, Raj RVK (2017) Hybridization of RSA and AES algorithms for authentication and confidentiality of medical images. Int Conf Commun Signal Process. https://doi.org/10.1109/ICCSP.2017.8286536

    Article  Google Scholar 

  27. Papadopoulos A, Nguyen T, Durmus E, Memon N (2017) IllusionPIN: shoulder-surfing resistant authentication using hybrid images. IEEE Trans Inf Forensics Secur 12(12):2875–2889. https://doi.org/10.1109/TIFS.2017.2725199

    Article  Google Scholar 

  28. Yi F, Kim Y, Moon I (2018) Secure image-authentication schemes with hidden double random-phase encoding. IEEE Access 6:70113–70121. https://doi.org/10.1109/ACCESS.2018.2880730

    Article  Google Scholar 

  29. Huang GB, Ramesh M, Berg T, Erik Learned-Miller (2007) Labeled faces in the wild: a database for studying face recognition in unconstrained environments. University of Massachusetts, Amherst, Technical Report 07-49

  30. Chouhan SS, Kaul A, Singh UP (2019) Image segmentation using computational intelligence techniques: review. Arch Comput Methods Eng 26:533–596. https://doi.org/10.1007/s11831-018-9257-4

    Article  MathSciNet  Google Scholar 

  31. Chouhan SS, Kaul A, Singh UP (2018) Soft computing approaches for image segmentation: a survey. Multimed Tools Appl 77:28483–28537. https://doi.org/10.1007/s11042-018-6005-6

    Article  Google Scholar 

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Uday Pratap Singh.

Ethics declarations

Conflict of interest

The corresponding author on behalf of all the author states that there is no conflict of interest to disclose

Appendix: Code for the proposed method

Appendix: Code for the proposed method

figure a
figure b
figure c
figure d
figure e
figure f
figure g
figure h
figure i
figure j
figure k
figure l
figure m
figure n
figure o
figure p
figure q
figure r
figure s
figure t
figure u
figure v
figure w
figure x
figure y
figure z
figure aa
figure ab
figure ac

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, U.P., Chouhan, S.S. & Jain, S. Images as graphical password: verification and analysis using non-regular low-density parity check coding. Int. j. inf. tecnol. (2020). https://doi.org/10.1007/s41870-020-00477-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s41870-020-00477-x

Keywords

Navigation