Skip to main content

An Efficient Multifactor Authentication System

  • Conference paper
  • First Online:
Computational Intelligence in Pattern Recognition (CIPR 2022)

Abstract

Most typical authentication mechanisms in this digitized world use a username and password to protect information. Two-factor authentication (2FA) mechanisms were introduced to add an extra layer of security. As 2FA is vulnerable to advanced attacks such as real-time replay, multifactor authentications (MFA) are being introduced and require multiple factors or proofs of identity during authentication. Thus, herein, we propose a multifactor authentication methodology using text-based encryption with a self-generated algorithm-Twine and image encryption with GENETIC algorithms. In our approach, when a user attempts to register on a Web page, they must enter details along with essential user id and password, further taking them to an image selection page where they can choose the image of their choice as a second layer of the authentication protocol. Hence, when a user attempts a login into the portal, they can be provided with options to enter via a graphical or text-based password depending on the feasibility and usage of the Web page. The introduction of a lightweight cryptographic algorithm here ensures an improbable zone for machine guessing strategies, and an innovative component for the user’s password, since both graphical and textual, will be hashed and stored and will have no permanent space in the database. It is observed that graphical passwords are easier to use and remembrance. Hence, this could be the next revolution in admin panels for multitude of security driven purposes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bhandari A, Tripathy BK, Jawad K, Bhatia S, Rahmani MKI, Mash A (2022) Cancer detection and prediction using genetic algorithms. Comput Intell Neurosci 2022:18. https://doi.org/10.1155/2022/1871841

  2. Sasikumar G, Tripathy BK (2010) Innovative applications of digital image processing. In: Proceedings of National conference on recent advances in neural network (NCRANN 2010), pp A-6

    Google Scholar 

  3. Tripathy BK, Sooraj TR, Mohanty RK (2019) Rough set and soft set models in image processing. In: Bhattacharyya S, Pan I, Das A, Gupta S (eds) Intelligent multimedia data analysis. De Gruyter, Berlin, Boston, pp 123–144

    Google Scholar 

  4. Narayanan B (2019) Secure authentication using dynamic grid pair technique and image authentication. Doctoral dissertation, Dublin, National College of Ireland

    Google Scholar 

  5. Tripathy BK, Chandramoulli PVSSR (2016) Computer graphics and applications. Ane Books Private Limited, Chennai. ISBN: 9789385462047

    Google Scholar 

  6. Katsini C, Raptis GE, Fidas C, Avouris N (2018) Does image grid visualization affect password strength and creation time in graphical authentication? In: Proceedings of the 2018 International conference on advanced visual interfaces, pp 1–5

    Google Scholar 

  7. Parmar H, Nainan N, Thaseen S (2012) Generation of secure one-time password based on image authentication. J Comput Sci Inf Technol 7:195–206

    Google Scholar 

  8. Takada T, Yoshida M (2021) Pict-place authentication: recognition-based graphical password using image layout for better balance of security and operation time. In: CHItaly 2021: 14th Biannual conference of the Italian SIGCHI Chapte, pp 1–7

    Google Scholar 

  9. Calanda FB, Sison AM, Molato MRD, Medina RP (2019) Simple and secured password hiding technique for image-based authentication using a least significant bit based embedding scheme. In: 2019 IEEE 4th International conference on technology, informatics, management, engineering & environment (TIME-E). IEEE, pp 32–36

    Google Scholar 

  10. Mohanty M, Yaqub W (2020) Towards seamless authentication for Zoom-based online teaching and meeting. arXiv preprint arXiv:2005.10553

  11. Ponmani E, Indhuja S, Puviarasi R, Saravanan P, Ananthakrishnan S (2018) An enhanced least significant bit steganography to improve the effectiveness of graphical password authentication. Int J Pure Appl Math 119(12):13325–13335

    Google Scholar 

  12. Zabidi NS, Norowi NM, Rahmat RWO (2018) A usability evaluation of image and emojis in graphical password. Int J Eng Technol 7(4.31):400–407

    Google Scholar 

  13. Hamid S, Bawany NZ, Khan S (2019) AcSIS: authentication system based on image splicing. Eng Technol Appl Sci Res 9(5):4808–4812

    Article  Google Scholar 

  14. Ghori F, Abbasi K (2013) Secure user authentication using graphical passwords. J Independent Stud Res 11(2):34

    Google Scholar 

  15. Mohamad Z, Thong LY, Zakaria AH, Awang WSW (2018) Image based authentication using zero-knowledge protocol. In: 2018 4th ICCTA. IEEE, pp 202–210

    Google Scholar 

  16. Khankari NB, Kale GV (2020) One time password generation for multifactor authentication using graphical password. Int J Eng Res Gen Sci 3(5):489–494

    Google Scholar 

  17. Katsini C, Fidas C, Raptis GE, Belk M, Samaras G, Avouris N (2018) Influences of human cognition and visual behavior on password strength during picture password composition. In: Proceedings of the 2018 CHI conference on human factors in computing systems, pp 1–14

    Google Scholar 

  18. Bianchi A, Oakley I, Kim H (2019) PassBYOP: bring your own picture for securing graphical passwords. IEEE Trans Human-Machine Syst 46(3):380–389

    Article  Google Scholar 

  19. Mackie I, Yıldırım M (2018) A novel hybrid password authentication scheme based on text and image. In: IFIP Annual conference on data and applications security and privacy. Springer, Cham, pp 182–197

    Google Scholar 

  20. Kadhum RN, Ali NHM (2022) Using steganography techniques for implicit authentication to enhance sensitive data hiding. Int J Nonlinear Anal Appl 13(1):4001–4011

    Google Scholar 

  21. Alia MA, Hnaif AA, Abdalla AM, Maria EMA (2018) An improved authentication scheme based on graphical passwords. ICIC Express Lett 12(8):775–783

    Google Scholar 

  22. Mishra GS, Mishra PK, Nand P, Astya R (2020) User authentication: a three level password authentication mechanism. J Phys Conf Ser 1712(1):012005

    Google Scholar 

  23. Irfan K, Anas A, Malik S, Amir S (2018) Text based graphical password system to obscure shoulder surfing. In: 2018 IBCAST. IEEE, pp 422–426

    Google Scholar 

  24. Lu D, Huang D, Deng Y, Alshamrani A (2018) Multi factor user authentication with in-air-handwriting and hand geometry. In: 2018 International conference on biometrics (ICB). IEEE, pp 255–262

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. K. Tripathy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Verma, S., Singh, M., Chaturvedi, K., Tripathy, B.K. (2023). An Efficient Multifactor Authentication System. In: Das, A.K., Nayak, J., Naik, B., Vimal, S., Pelusi, D. (eds) Computational Intelligence in Pattern Recognition. CIPR 2022. Lecture Notes in Networks and Systems, vol 725. Springer, Singapore. https://doi.org/10.1007/978-981-99-3734-9_10

Download citation

Publish with us

Policies and ethics