Skip to main content
placeholder image

Visual authentication based on visual cryptography using mobile devices

Chapter


Abstract


  • Authentication refers to the process of confirming the identity of the authenticating entity. The use of passwords for user authentication has become ubiquitous in our everyday lives. Despite its wide-spread usage, password-based authentication has numerous deficiencies. For instance, password theft is becoming a common occurrence due to a variety of security problems associated with passwords.As such, many organizations are moving towards adopting alternative solutions like one-time passwords, which are only valid for a single session. Nevertheless, various one-time password schemes also suffer from a number of drawbacks in terms of their method of generation or delivery. In this chapter, we present a challenge-response visual one-time password authentication scheme that is to be used in conjunction with the camera on a mobile device. The main feature of the proposed scheme is to allow the server to send a challenge over a public channel for a user to obtain a session key while safeguarding the user’s long-term secret key. We present the authentication protocol, its security analysis, the various design considerations and the advantages provided by our system.

UOW Authors


Publication Date


  • 2017

Citation


  • Chow, Y., Susilo, W., Au, M. Ho. & Barmawi, A. (2017). Visual authentication based on visual cryptography using mobile devices. In M. Weizhi, L. Xiapu, F. Steven & Z. Jianying (Eds.), Protecting Mobile Networks and Devices: Challenges and Solutions (pp. 1-17). United States: CRC. https://www.crcpress.com/Protecting-Mobile-Networks-and-Devices-Challenges-and-Solutions/Meng-Luo-Furnell-Zhou/p/book/9781498735834

Book Title


  • Protecting Mobile Networks and Devices: Challenges and Solutions

Start Page


  • 1

End Page


  • 17

Place Of Publication


  • https://www.crcpress.com/Protecting-Mobile-Networks-and-Devices-Challenges-and-Solutions/Meng-Luo-Furnell-Zhou/p/book/9781498735834

Abstract


  • Authentication refers to the process of confirming the identity of the authenticating entity. The use of passwords for user authentication has become ubiquitous in our everyday lives. Despite its wide-spread usage, password-based authentication has numerous deficiencies. For instance, password theft is becoming a common occurrence due to a variety of security problems associated with passwords.As such, many organizations are moving towards adopting alternative solutions like one-time passwords, which are only valid for a single session. Nevertheless, various one-time password schemes also suffer from a number of drawbacks in terms of their method of generation or delivery. In this chapter, we present a challenge-response visual one-time password authentication scheme that is to be used in conjunction with the camera on a mobile device. The main feature of the proposed scheme is to allow the server to send a challenge over a public channel for a user to obtain a session key while safeguarding the user’s long-term secret key. We present the authentication protocol, its security analysis, the various design considerations and the advantages provided by our system.

UOW Authors


Publication Date


  • 2017

Citation


  • Chow, Y., Susilo, W., Au, M. Ho. & Barmawi, A. (2017). Visual authentication based on visual cryptography using mobile devices. In M. Weizhi, L. Xiapu, F. Steven & Z. Jianying (Eds.), Protecting Mobile Networks and Devices: Challenges and Solutions (pp. 1-17). United States: CRC. https://www.crcpress.com/Protecting-Mobile-Networks-and-Devices-Challenges-and-Solutions/Meng-Luo-Furnell-Zhou/p/book/9781498735834

Book Title


  • Protecting Mobile Networks and Devices: Challenges and Solutions

Start Page


  • 1

End Page


  • 17

Place Of Publication


  • https://www.crcpress.com/Protecting-Mobile-Networks-and-Devices-Challenges-and-Solutions/Meng-Luo-Furnell-Zhou/p/book/9781498735834