Skip to main content

A Novel Hybrid User Authentication Scheme Using Cognitive Ambiguous Illusion Images

  • Conference paper
  • First Online:
Data Communication and Networks

Abstract

Text-based passwords are most common and easy to use but are difficult to memorize and remember. Moreover, they are prone to attacks like shoulder surfing and brute-force. On the other hand, graphical passwords are easy to remember and memorize. But they are still not commonly used as they have some issues like increased user login time, and small password space. In today’s scenario where number of data breaches is increasing, more secure authentication schemes are needed to ensure the authenticity of a user. In this paper, we propose a novel hybrid user authentication scheme by integrating both text-based and graphical password schemes to make authentication system stronger and resistant to attacks. Our scheme has two steps of authentication, in which at the first step, the user has to recognize and select his appropriate image among the blurred images and in the next step, the user has to enter the tag associated with the selected image. Only after successful completion of the two steps, the user is authenticated. The images used as a part of graphical password scheme are cognitive ambiguous illusion images. The basic idea behind using these images is that they are perceived by different users differently depending on how they visualize the image. To evaluate the effectiveness of the proposed scheme, an experiment was conducted on the setup and the results obtained were promising.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. R. Dhamija, A. Perrig, (2000) Deja Vu-a user study: using images for authentication, in USENIX Security Symposium, vol. 9, pp. 4–4

    Google Scholar 

  2. E. Stobert, R. Biddle, Memory retrieval and graphical passwords, in Proceedings of the Ninth Symposium on Usable Privacy and Security (ACM, 2013), p. 15

    Google Scholar 

  3. A.V. Kayem, (2016) Graphical passwords—a discussion, in 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA) (IEEE), pp. 596–600

    Google Scholar 

  4. E. Hayashi, R. Dhamija, N. Christin, A. Pering, Use your illusion: secure authentication usable anywhere, in Proceedings of the 4th Symposium on Usable Privacy and Security (ACM, 2008), pp. 35–45

    Google Scholar 

  5. K.D.D.P. Prabhu, Image based authentication using illusion pin for shoulder surfing attack. Int. J. Pure Appl. Math. 119(7), 835–840 (2018)

    Google Scholar 

  6. T. Zangooei, M. Mansoori, I. Welch, A hybrid recognition and recall based approach in graphical passwords, in Proceedings of the 24th Australian Computer-Human Interaction Conference (ACM, 2012), pp. 665–673

    Google Scholar 

  7. L.T. Hui, H.K. Bashier, L.S. Hoe, G.K.O. Michael, W.K. Kwee, Conceptual framework for high-end graphical password, in 2014 2nd International Conference on Information and Communication Technology (ICoICT) (IEEE, 2014), pp. 64–68

    Google Scholar 

  8. M.S. Umar, M.Q Rafiq, J.A. Ansari, Graphical user authentication: a time interval based approach, in 2012 IEEE International Conference on Signal Processing, Computing and Control (IEEE, 2012), pp. 1–6

    Google Scholar 

  9. S. Istyaq, M.S. Umar, Hybrid authentication scheme for graphical password using QR code and integrated sound signature. Int. J. Comput. Electr. Autom. Control Inf. Eng. 111–115 (2018)

    Google Scholar 

  10. M.S. Umar, M.Q. Rafiq, A graphical interface for user authentication on mobile phones, in ACHI 2011: The Fourth International Conference on Advances in Computer-Human Interactions (2011), pp. 69–74

    Google Scholar 

  11. A. Usmani, A. Maryam, M.S. Umar, M.H. Khan, New text-based user authentication scheme using CAPTCHA, in Information and Communication Technology for Competitive Strategies (Springer, Singapore, 2019), pp. 313–322

    Google Scholar 

  12. S. Saeed, M.S. Umar, PassNeighbor: a shoulder surfing resistant scheme, in 2016 2nd International Conference on Next Generation Computing Technologies (NGCT) (IEEE, 2016), pp. 797–802

    Google Scholar 

  13. S. Agrawal, A.Z. Ansari, M.S. Umar, Multimedia graphical grid based text password authentication: for advanced users, in 2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN) (IEEE, 2016), pp. 1–5

    Google Scholar 

  14. Z. Zheng, X. Liu, L. Yin, Z. Liu, A hybrid password authentication scheme based on shape and text. JCP 5(5), 765–772 (2010)

    Google Scholar 

  15. R. Fatima, N. Siddiqui, M.S. Umar, M.H. Khan, A novel text-based user authentication scheme using pseudo-dynamic password, in Information and Communication Technology for Competitive Strategies (Springer, Singapore, 2019), pp. 177–186

    Google Scholar 

  16. Z. Zaheer, A. Khan, M.S. Umar, M.H. Khan, One-tip secure: next-gen of text-based password, in Information and Communication Technology for Competitive Strategies (Springer, Singapore, 2019), pp. 235–243

    Google Scholar 

  17. M.H. Zaki, A. Husain, M.S. Umar, M.H. Khan, Secure pattern-key based password authentication scheme, in 2017 International Conference on Multimedia, Signal Processing and Communication Technologies (IMPACT) (IEEE, 2017), pp. 171–174

    Google Scholar 

  18. X. Yu, Z. Wang, Y. Li, L. Li, W.T. Zhu, L. Song, EvoPass: evolvable graphical password against shoulder-surfing attacks. Comput. Secur. 70, 179–198 (2017)

    Article  Google Scholar 

  19. A. Danish, L. Sharma, H. Varshney, A.M. Khan, Alignment based graphical password authentication system, in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) (IEEE, 2016), pp. 2950–2954

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sumaiya Dabeer .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dabeer, S., Ahmad, M., Sarosh Umar, M., Hasan Khan, M. (2020). A Novel Hybrid User Authentication Scheme Using Cognitive Ambiguous Illusion Images. In: Jain, L., Tsihrintzis, G., Balas, V., Sharma, D. (eds) Data Communication and Networks. Advances in Intelligent Systems and Computing, vol 1049. Springer, Singapore. https://doi.org/10.1007/978-981-15-0132-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0132-6_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0131-9

  • Online ISBN: 978-981-15-0132-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics