Secure Data Access using Steganography and Image Based Password

Authors

  • Prof. P. S. Gayke  Assistant Professor, Department of Information Technology, Dr. Vithalrao Vikhe Patil College of Engineering, Ahmednagar Savitribai Phule Pune University, Pune, Maharashtra, India
  • Shraddha Thorat  Student, Department of Information Technology, Dr. Vithalrao Vikhe Patil College of Engineering, Ahmednagar Savitribai Phule Pune University, Pune, Maharashtra, India
  • Gayatri Nagarkar  Student, Department of Information Technology, Dr. Vithalrao Vikhe Patil College of Engineering, Ahmednagar Savitribai Phule Pune University, Pune, Maharashtra, India
  • Priyanka Kusalkar  Student, Department of Information Technology, Dr. Vithalrao Vikhe Patil College of Engineering, Ahmednagar Savitribai Phule Pune University, Pune, Maharashtra, India
  • Priyanka Waditake  Student, Department of Information Technology, Dr. Vithalrao Vikhe Patil College of Engineering, Ahmednagar Savitribai Phule Pune University, Pune, Maharashtra, India

DOI:

https://doi.org//10.32628/IJSRST229343

Keywords:

Shoulder Surfing, Steganography and Cryptography, Image Processing, Classification, Shoulder Surfing, Training Images, OTP, Secret Bit, Keylogging

Abstract

Technology has developed to a very great extent, and the use of smart systems has introduced an increasing threat to data security and privacy. Most of the applications are built-in unsecured operating systems, and so there is a growing threat to information cloning, forging tampering counterfeiting, etc. This will lead to an un-compensatory loss for end-users particularly in banking applications and personal data in social media. The shoulder surfing attack in an assault that can be achieved with the aid of the adversary to accumulate the individual’s password by way of searching over the client’s shoulder as he enters his password. As conventional password schemes are vulnerable to Shoulder Surfing, Steganography and Cryptography proposed three shoulder surfing resistant graphical password schemes. However, most of the current graphical password schemes is liable to shoulder-browsing a recounted hazard wherein an attacker can seize a password by means of way of direct statement or by recording the authentication consultation. Because of the visual interface, shoulder-browsing becomes an exacerbated problem in graphical passwords. A graphical password is easier than a textual content-based password for the majority to undergo in thoughts. Suppose an eight-man or woman password is critical to benefit access into a specific computer network. Sturdy passwords may be produced which might be proof against guessing, dictionary assault. Key-loggers, shoulder surfing and social engineering. Graphical passwords have been utilized in authentication for mobile phones, ATM machines, E-transactions.

References

  1. A Yahaya Lawal Aliyu, Madihah Mohd Saudi, Ismail Abdullah,  A Review and Proof of Concept for Phishing Scam Detection and Response using Apoptosis”. (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No. 6, 2017
  2. Gori Mohamed J, M. Mohammed Mohideen, Mrs. Shahira Banu. N, “E-Mail Phishing – An open threat to everyone”. International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 ISSN 2250-3153
  3. Rana Alabdan, “Phishing Attacks Survey: Types, Vectors, and Technical Approaches”. Future Internet Journal 2020
  4. David Lacey, Paul Salmon, Patrick Glancy, “Taking the bait: a systems analysis of phishing attacks”. International Conference on Applied Human Factors and Ergonomics (AHFE 2015)
  5. Ike Vayansky and Sathish Kumar, “Phishing – challenges and solutions”. Computer Fraud & Security January 2018.
  6. S. Sood, A. Sarje, and K. Singh, “Cryptanalysis of password authentication schemes: Current status and key issues,” in Methods and Models in Computer Science, 2009. ICM2CS 2009. Proceeding of International Conference on, Dec 2009, pp. 1–7.
  7. S. Gurav, L. Gawade, P. Rane, and N. Khochare, “Graphical password authentication: Cloud securing scheme,” in Electronic Systems, Signal Processing and Computing Technologies (ICESC), 2014 International Conference on, Jan 2014, pp. 479–483.
  8. K. Gilhooly, “Biometrics: Getting back to business,” Computerworld, May, vol. 9, 2005. R. Dhamija and A. Perrig, “Deja vu: A user study using images for authentication,” in Proceedings of the 9th conference on USENIX Security Symposium-Volume 9. USENIX Association, 2000, pp. 4–4.
  9. S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, “Passpoints: Design and longitudinal evaluation of a graphical password system,” International Journal of Human-Computer Studies, vol. 63, no. 1-2, pp. 102–127, 2005.
  10. A. Paivio, T. Rogers, and P. Smythe, “Why are pictures easier to recall than words?” Psychonomic Science, 1968.
  11. D. Nelson, U. Reed, and J. Walling, “Picture superiority effect,” Journal of Experimental Psychology: Human Learning and Memory, vol. 3, pp. 485–497, 1977.
  12. A. De Angeli, M. Coutts, L. Coventry, G. Johnson, D. Cameron, and M. Fischer, “Vip: a visual approach to user authentication,” in Proceedings of the Working Conference on Advanced Visual Interfaces. ACM, 2002, pp. 316–323

Downloads

Published

2022-06-30

Issue

Section

Research Articles

How to Cite

[1]
Prof. P. S. Gayke, Shraddha Thorat, Gayatri Nagarkar, Priyanka Kusalkar, Priyanka Waditake, " Secure Data Access using Steganography and Image Based Password , International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 9, Issue 3, pp.193-198, May-June-2022. Available at doi : https://doi.org/10.32628/IJSRST229343