Application of digital water marks for developing graphical password systems
Application of digital water marks for developing graphical password systems
Blog Article
The relevance of the work consists in increasing the security of protected resources with the passage of identification/authentication of users by means of graphic password, which can be achieved through the application of methods of steganography.The main aim of the study is to improve the reliability of user identification/authentication applying a graphical password system using digital watermarking.Application of steganography methods increases system resistance to the majority of known methods of hacking systems with password authentication.The methods used in the study: the methods of probability theory, mathematical analysis and experimental studies of steganography.Software implementation of the method was performed using a programming environment Borland C + stickers logos dallas cowboys +.
The results: The paper introduces the possibility of creating a system of graphical passwords using steganography techniques, in particular digital watermarks, which are used in the systems of identification/authentication as one-time passwords for authentication and user access to protected resources.The author also introduces the basic block diagrams for implementing two graphical password systems, the first one is icon-based, the second uses an image harry potter magsafe case file with many details.The author has proved empirically the effectiveness of applying the given password systems with respect to the common password authentication methods.A user just remembers the sequence of icons or sequence of keystrokes on a graphic file, but not the complex password sequences.The system changes automatically the passwords without user intervention in the process.
But as an option a user can change the order of icons or areas of clicks on an image file to login.The use of the proposed algorithms allows you to create a stable system identification/authentication, and reduce time-remember passwords and authorization of users in systems that require login and password.