DocumentCode :
2744724
Title :
Image Authentication Schemes against Key-Logger Spyware
Author :
Doja, M.N. ; Kumar, Naveen
Author_Institution :
Dept. of Comput. Eng., Jamia Millia Islamia, New Delhi
fYear :
2008
fDate :
6-8 Aug. 2008
Firstpage :
574
Lastpage :
579
Abstract :
Spywares has become major problem now days. This type of software may track user activities online and offline, provide targeted advertising and/or hold in other types of uninvited activities. Password collection by spywares is increasing at a shocking pace [1]. The problem of entering sensitive data, such as passwords, from an untrusted machine, is obviously undesirable, however roaming users generally have no other option. They are in no point to review the security status of Internet cafe or business center machines, and as no alternative to typing the password. We consider whether it is possible to enter data to confuse spyware assumed to be running on the machine in question. The difficulty of mounting a collusion attack on a single userpsilas password makes the problem more tractable than it might appear. This problem of password security can be improved by biometric based authentication and graphical authentication, however availability and cost of biometric authentication is considerable problem. In this paper, we present an alternative user authentication based on Images that is resistant to keylogger spywares. We have design and implemented a method that uses a strengthened cryptographic hash function to compute fast and secure passwords for arbitrarily many accounts while requiring the user to memorize only few memorable points in the image. In addition to keylogger spywares our design is also highly resistant to brute force attacks and prone to Dictionary attack, allowing users to retrieve their passwords from any location so long as they can execute our program and remember a short secret. This combination of security and usability will attract users to adopt our scheme. This paper will be useful for information security researchers and practitioners who are interested in finding an alternative to spyware resistant user authentication.
Keywords :
cryptography; security of data; biometric based authentication; brute force attacks; collusion attack; cryptographic hash function; graphical authentication; image authentication schemes; information security; key-logger spyware; password collection; password security; roaming users; uninvited activities; untrusted machine; user activities; user authentication; Advertising; Authentication; Biometrics; Costs; Cryptography; Data security; Immune system; Information security; Internet; Target tracking;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2008. SNPD '08. Ninth ACIS International Conference on
Conference_Location :
Phuket
Print_ISBN :
978-0-7695-3263-9
Type :
conf
DOI :
10.1109/SNPD.2008.166
Filename :
4617434
Link To Document :
بازگشت