Deep learning based graphical password authentication approach against shoulder-surfing attacks

IF 0.6 Q4 COMPUTER SCIENCE, THEORY & METHODS Multiagent and Grid Systems Pub Date : 2023-06-08 DOI:10.3233/mgs-230024
Norman Dias, Mouleeswaran Singanallur Kumaresan, Reeja Sundaran Rajakumari
{"title":"Deep learning based graphical password authentication approach against shoulder-surfing attacks","authors":"Norman Dias, Mouleeswaran Singanallur Kumaresan, Reeja Sundaran Rajakumari","doi":"10.3233/mgs-230024","DOIUrl":null,"url":null,"abstract":"The password used to authenticate users is vulnerable to shoulder-surfing assaults, in which attackers directly observe users and steal their passwords without using any other technical upkeep. The graphical password system is regarded as a likely backup plan to the alphanumeric password system. Additionally, for system privacy and security, a number of programs make considerable use of the graphical password-based authentication method. The user chooses the image for the authentication procedure when using a graphical password. Furthermore, graphical password approaches are more secure than text-based password methods. In this paper, the effective graphical password authentication model, named as Deep Residual Network based Graphical Password is introduced. Generally, the graphical password authentication process includes three phases, namely registration, login, and authentication. The secret pass image selection and challenge set generation process is employed in the two-step registration process. The challenge set generation is mainly carried out based on the generation of decoy and pass images by performing an edge detection process. In addition, edge detection is performed using the Deep Residual Network classifier. The developed Deep Residual Network based Graphical Password algorithm outperformance than other existing graphical password authentication methods in terms of Information Retention Rate and Password Diversity Score of 0.1716 and 0.1643, respectively.","PeriodicalId":43659,"journal":{"name":"Multiagent and Grid Systems","volume":null,"pages":null},"PeriodicalIF":0.6000,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Multiagent and Grid Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3233/mgs-230024","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 1

Abstract

The password used to authenticate users is vulnerable to shoulder-surfing assaults, in which attackers directly observe users and steal their passwords without using any other technical upkeep. The graphical password system is regarded as a likely backup plan to the alphanumeric password system. Additionally, for system privacy and security, a number of programs make considerable use of the graphical password-based authentication method. The user chooses the image for the authentication procedure when using a graphical password. Furthermore, graphical password approaches are more secure than text-based password methods. In this paper, the effective graphical password authentication model, named as Deep Residual Network based Graphical Password is introduced. Generally, the graphical password authentication process includes three phases, namely registration, login, and authentication. The secret pass image selection and challenge set generation process is employed in the two-step registration process. The challenge set generation is mainly carried out based on the generation of decoy and pass images by performing an edge detection process. In addition, edge detection is performed using the Deep Residual Network classifier. The developed Deep Residual Network based Graphical Password algorithm outperformance than other existing graphical password authentication methods in terms of Information Retention Rate and Password Diversity Score of 0.1716 and 0.1643, respectively.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于深度学习的图形密码认证方法对抗肩部冲浪攻击
用于验证用户身份的密码很容易受到肩部冲浪攻击,攻击者在不使用任何其他技术维护的情况下直接观察用户并窃取他们的密码。图形密码系统被视为字母数字密码系统的可能备份计划。此外,为了系统隐私和安全,许多程序大量使用基于图形密码的身份验证方法。用户在使用图形密码时选择用于身份验证过程的图像。此外,图形密码方法比基于文本的密码方法更安全。本文介绍了一种有效的图形密码认证模型——基于深度残差网络的图形密码。通常,图形密码身份验证过程包括三个阶段,即注册、登录和身份验证。在两步配准过程中采用了秘密通道图像选择和挑战集生成过程。挑战集的生成主要基于通过执行边缘检测处理来生成诱饵和通过图像。此外,使用深度残差网络分类器进行边缘检测。所开发的基于深度残差网络的图形密码算法在信息保留率和密码多样性得分方面分别优于其他现有的图形密码认证方法0.1716和0.1643。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Multiagent and Grid Systems
Multiagent and Grid Systems COMPUTER SCIENCE, THEORY & METHODS-
CiteScore
1.50
自引率
0.00%
发文量
13
期刊最新文献
Blockchain applications for Internet of Things (IoT): A review Sine tangent search algorithm enabled LeNet for cotton crop classification using satellite image Optimization enabled elastic scaling in cloud based on predicted load for resource management Geese jellyfish search optimization trained deep learning for multiclass plant disease detection using leaf images Adam Adadelta Optimization based bidirectional encoder representations from transformers model for fake news detection on social media
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1