An Enhanced Least Significant Bit Steganography to Improve the Effectiveness of Graphical Password Authentication

Ponmani, E, Indhuja, S, Puviarasi, R, Saravanan, Palani and Ananthakrishnan, S An Enhanced Least Significant Bit Steganography to Improve the Effectiveness of Graphical Password Authentication. International Journal of Pure and Applied Mathematics, 2018, vol. 119, n. 12, pp. 13325-13335. [Journal article (Paginated)]

[thumbnail of 1215.pdf]
Preview
Text
1215.pdf

Download (437kB) | Preview

English abstract

Authentication means acknowledging a user’s identity. It is the way of associating a request with a set of identity. The identification provided is an authorized user’s information on a personal computer system or within an authentication server. A graphical password is a validation system in which user has to select from images, in a particular order, presented in a graphical user + interface (GUI). Graphical passwords can be easily remembered, as users remember images better than words. Also, the system should be more unaffected by brute-force attacks, because there is practically an infinite search space. Complex text passwords are hard to remember and simple textual passwords are easy to guess. Graphical passwords provide more robustness and memorability. It is a secure mechanism to provide authenticated sign up to a system.

Item type: Journal article (Paginated)
Keywords: Image Steganography, ELSB algorithm, Pattern hiding, Graphical password
Subjects: B. Information use and sociology of information
B. Information use and sociology of information > BC. Information in society.
Depositing user: Raster Daster
Date deposited: 02 Aug 2018 07:30
Last modified: 02 Aug 2018 07:30
URI: http://hdl.handle.net/10760/33259

References

[1] Mstafa, R. J. (2013, March). Information Hiding in Images Using Steganography Techniques. ASEE.

[2] Sumathi, C. P., Santanam, T., & Umamaheswari, G. (2014). A study of various steganographic techniques used for information hiding. arXiv preprint arXiv:1401.5561.

[3] Kaur, S., Bansal, S., & Bansal, R. K. (2014, March). Steganography and classification of image steganography techniques. In Computing for Sustainable Global Development (INDIACom), 2014 International Conference on (pp. 870-875). IEEE.

[4] Gurav, S. M., Gawade, L. S., Rane, P. K., & Khochare, N. R. (2014, January). Graphical password authentication: Cloud securing scheme. In Electronic Systems, Signal Processing and Computing Technologies (ICESC), 2014 International Conference on (pp. 479-483). IEEE.

[5] Kumar, E. A., & Bilandi, E. N. (2014). A Graphical Password based Authentication based System for Mobile Devices. International Journal of Computer Science and Mobile Computing, 3(4), 744-754.

[6] Jeevana, P. Evaluation of McCabe’s Cyclomatic Complexity Metrics for Secured Medical Image..

[7] Juneja, K. (2017). An XML transformed method to improve effectiveness of graphical password authentication. Journal of King Saud University-Computer and Information Sciences

[8] Pavani, M., Naganjaneyulu, S., & Nagaraju, C. (2013). A survey on LSB based steganography methods. International Journal Of Engineering And Computer Science ISSN, 2319-7242..

[9] Zhang, T., & Ping, X. (2003). A new approach to reliable detection of LSB steganography in natural images. Signal processing, 83(10), 2085-2093.

[10] Ker, A. D. (2005). Steganalysis of LSB matching in grayscale images. IEEE signal processing letters, 12(6), 441-444.

[11] Morkel, T., Eloff, J. H., & Olivier, M. S. (2005, June). An overview of image steganography. In ISSA (pp. 1-11).

[12] Luo, W., Huang, F., & Huang, J. (2010). Edge adaptive image steganography based on LSB matching revisited. IEEE transactions on information forensics and security, 5(2), 201-214.

[13] Parvez, M. T., & Gutub, A. A. A. (2008, December). RGB intensity based variable-bits image steganography. In Asia-Pacific Services Computing Conference, 2008. APSCC'08. IEEE (pp. 1322-1327). IEEE.

[14] Arunkumar, S., Subramaniyaswamy, V., Karthikeyan, B., Saravanan, P., Logesh, R. Meta-data based secret image sharing application for different sized biomedical images (2017) Biomedical Research (India), 2017 (Special Issue), pp. 1-5.

[15] BrahmaTeja, K. N., Madhumati, D. G., & Rao, K. R. K. (2012). Data hiding using EDGE based steganography. International journal of Emerging Technology and advanced Engineering, 2(11), 285-290.

[16] Logesh, R., Subramaniyaswamy, V., Vijayakumar, V., Gao, X. Z., & Indragandhi, V. (2017). A hybrid quantum-induced swarm intelligence clustering for the urban trip recommendation in smart city. Future Generation Computer Systems, 83, 653-673.

[17] Subramaniyaswamy, V., & Logesh, R. (2017). Adaptive KNN based Recommender System through Mining of User Preferences. Wireless Personal Communications, 97(2), 2229-2247.

[18] Logesh, R., & Subramaniyaswamy, V. (2017). A Reliable Point of Interest Recommendation based on Trust Relevancy between Users. Wireless Personal Communications, 97(2), 2751-2780.

[19] Logesh, R., & Subramaniyaswamy, V. (2017). Learning Recency and Inferring Associations in Location Based Social Network for Emotion Induced Point-of-Interest Recommendation. Journal of Information Science & Engineering, 33(6), 1629–1647.

[20] Subramaniyaswamy, V., Logesh, R., Abejith, M., Umasankar, S., & Umamakeswari, A. (2017). Sentiment Analysis of Tweets for Estimating Criticality and Security of Events. Journal of Organizational and End User Computing (JOEUC), 29(4), 51-71.

[21] Indragandhi, V., Logesh, R., Subramaniyaswamy, V., Vijayakumar, V., Siarry, P., & Uden, L. (2018). Multi-objective optimization and energy management in renewable based AC/DC microgrid. Computers & Electrical Engineering.

[22] Subramaniyaswamy, V., Manogaran, G., Logesh, R., Vijayakumar, V., Chilamkurti, N., Malathi, D., & Senthilselvan, N. (2018). An ontology-driven personalized food recommendation in IoT-based healthcare system. The Journal of Supercomputing, 1-33.

[23] Arunkumar, S., Subramaniyaswamy, V., & Logesh, R. (2018). Hybrid Transform based Adaptive Steganography Scheme using Support Vector Machine for Cloud Storage. Cluster Computing.

[24] Indragandhi, V., Subramaniyaswamy, V., & Logesh, R. (2017). Resources, configurations, and soft computing techniques for power management and control of PV/wind hybrid system. Renewable and Sustainable Energy Reviews, 69, 129-143.

[25] Ravi, L., & Vairavasundaram, S. (2016). A collaborative location based travel recommendation system through enhanced rating prediction for the group of users. Computational intelligence and neuroscience, 2016, Article ID: 1291358.

[26] Logesh, R., Subramaniyaswamy, V., Malathi, D., Senthilselvan, N., Sasikumar, A., & Saravanan, P. (2017). Dynamic particle swarm optimization for personalized recommender system based on electroencephalography feedback. Biomedical Research, 28(13), 5646-5650.

[27] Vairavasundaram, S., Varadharajan, V., Vairavasundaram, I., & Ravi, L. (2015). Data mining‐based tag recommendation system: an overview. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 5(3), 87-112.

[28] Logesh, R., Subramaniyaswamy, V., & Vijayakumar, V. (2018). A personalised travel recommender system utilising social network profile and accurate GPS data. Electronic Government, an International Journal, 14(1), 90-113.

[29] Vijayakumar, V., Subramaniyaswamy, V., Logesh, R., & Sivapathi, A. (2018). Effective Knowledge Based Recommeder System for Tailored Multiple Point of Interest Recommendation. International Journal of Web Portals.

[30] Subramaniyaswamy, V., Logesh, R., & Indragandhi, V. (2018). Intelligent sports commentary recommendation system for individual cricket players. International Journal of Advanced Intelligence Paradigms, 10(1-2), 103-117.

[31] Indragandhi, V., Subramaniyaswamy, V., & Logesh, R. (2017). Topological review and analysis of DC-DC boost converters. Journal of Engineering Science and Technology, 12 (6), 1541–1567.

[32] Saravanan, P., Arunkumar, S., Subramaniyaswamy, V., & Logesh, R. (2017). Enhanced web caching using bloom filter for local area networks. International Journal of Mechanical Engineering and Technology, 8(8), 211-217.

[33] Arunkumar, S., Subramaniyaswamy, V., Devika, R., & Logesh, R. (2017). Generating visually meaningful encrypted image using image splitting technique. International Journal of Mechanical Engineering and Technology, 8(8), 361–368.

[34] Subramaniyaswamy, V., Logesh, R., Chandrashekhar, M., Challa, A., & Vijayakumar, V. (2017). A personalised movie recommendation system based on collaborative filtering. International Journal of High Performance Computing and Networking, 10(1-2), 54-63.

[35] Senthilselvan, N., Udaya Sree, N., Medini, T., Subhakari Mounika, G., Subramaniyaswamy, V., Sivaramakrishnan, N., & Logesh, R. (2017). Keyword-aware recommender system based on user demographic attributes. International Journal of Mechanical Engineering and Technology, 8(8), 1466-1476.

[36] Subramaniyaswamy, V., Logesh, R., Vijayakumar, V., & Indragandhi, V. (2015). Automated Message Filtering System in Online Social Network. Procedia Computer Science, 50, 466-475.

[37] Subramaniyaswamy, V., Vijayakumar, V., Logesh, R., & Indragandhi, V. (2015). Unstructured data analysis on big data using map reduce. Procedia Computer Science, 50, 456-465.

[38] Subramaniyaswamy, V., Vijayakumar, V., Logesh, R., & Indragandhi, V. (2015). Intelligent travel recommendation system by mining attributes from community contributed photos. Procedia Computer Science, 50, 447-455.

[39] Vairavasundaram, S., & Logesh, R. (2017). Applying Semantic Relations for Automatic Topic Ontology Construction. Developments and Trends in Intelligent Technologies and Smart Systems, 48.


Downloads

Downloads per month over past year

Actions (login required)

View Item View Item