Open Access   Article Go Back

Authentication Using Improved Image Based OTP

Shweta Gupta1 , Prateek Gupta2 , Amit Ranjan3

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-10 , Page no. 64-67, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si10.6467

Online published on May 05, 2019

Copyright © Shweta Gupta, Prateek Gupta, Amit Ranjan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shweta Gupta, Prateek Gupta, Amit Ranjan, “Authentication Using Improved Image Based OTP,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.64-67, 2019.

MLA Style Citation: Shweta Gupta, Prateek Gupta, Amit Ranjan "Authentication Using Improved Image Based OTP." International Journal of Computer Sciences and Engineering 07.10 (2019): 64-67.

APA Style Citation: Shweta Gupta, Prateek Gupta, Amit Ranjan, (2019). Authentication Using Improved Image Based OTP. International Journal of Computer Sciences and Engineering, 07(10), 64-67.

BibTex Style Citation:
@article{Gupta_2019,
author = {Shweta Gupta, Prateek Gupta, Amit Ranjan},
title = {Authentication Using Improved Image Based OTP},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {10},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {64-67},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=975},
doi = {https://doi.org/10.26438/ijcse/v7i10.6467}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i10.6467}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=975
TI - Authentication Using Improved Image Based OTP
T2 - International Journal of Computer Sciences and Engineering
AU - Shweta Gupta, Prateek Gupta, Amit Ranjan
PY - 2019
DA - 2019/05/05
PB - IJCSE, Indore, INDIA
SP - 64-67
IS - 10
VL - 07
SN - 2347-2693
ER -

           

Abstract

Everything in our digital life requires an authentication mechanism to establish the identity of the user and protect his/her privacy. Since passwords are the most common form of authentication, our aim is to provide an alternative form that is not susceptible to the security risks and problems associated with passwords. However, the password may be foreseeable because it should be easy for users to memorize. Thus, an rival could get the passwords of users by brute-force attack in a short period of time. Two-Factor Authentication (TFA) can be used as a antidote to this weakness. One Time Password is mostly used authentication method now days. Our proposed idea is to enhance the security level of One Time Password by using improved and more secure image based OTP. In this method text fields are encrypted with image as key string to produce OTP. Proposed method keep resistance against token theft, man in the middle attack, reply attacks etc.

Key-Words / Index Term

Authentication, TFA, MFA, OTP, Image OTP

References

[1] Leeladhar, V. “Taking Banking services to the common man-financial inclusion”. Reserve Bank of India Bulletin, (2006).
[2] Davi, L., A. Dmitrienko, et al.,“Privilege Escalation Attacks on Android Information Security,” M. Burmester, G. Tsudik, S. Magliveras and I.Ilic, Springer Berlin /Heidelberg. 6531: 346-360, 2011.
[3] “Juniper Networks.Mobile Malware Development Continues To Rise,Android leads The Way”. Available at http://globalthreatcenter.com/?p=2492, 2011.
[4] Ausitn, Charles Frederick, Xingsheng Wan, and Andrew Wright. ”Two factor authentication”, U.S. Patent Application 13/748, 153
[5] K. Rieck, P. Stewin, and J.-P. Seifert ,“SMS-Based One-Time Passwords: Attacks and Defence” DIMVA 2013, LNCS 7967, Springer-Verlag Berlin Heidelberg 2013,pp. 150–159, 2013.
[6] “Man in the Middle” Available on http://securityblog.s21sec.com/2010/09/zeus-mitmo-man-in-mobile-i.html 2010
[7] Dr. Ananthi Shesashaayee, D. Sumathy” OTP Encryption Techniques in Mobiles for Authentication and Transaction Security” IJIRCCE Vol 2, Issue 10, Oct 2014.
[8] Mohammed Hamid Khan “OTP Generation using SHA-1” IJRITCC Vol 3, Issue 4, Apr 2015.
[9] Safa Hamdare, Varsha Nagpurkar, Jayashri Mittal “Securing SMS Based One Time Password Technique from Man in the Middle Attack”, (IJETT)-Volume 11 Issue 3- May 2014.
[10] Himika Parmar1, Nancy Nainan2 and Sumaiya Thaseen, “Generation 0f Secure One-Time Password Based On Image Authentication”, CS & IT-CSCP 2012.
[11] Pwc, “pwc cybersecurity,” Pricewaterhouse Coopers, 2016. [Online]. Available: http://www.pwc.com/gsiss. [Accessed 30 May 2016].
[12] TechTarget .(2015,March).Retrieved May 20, 2016,
[13] Hoyul Choi, Hyunsoo Kwon “A Secure OTP Algorithm Using a Smartphone Application”, IEEE-2015.
[14] Changsok Yoo, Byung-Tak Kang, Huy Kang Kim, ”Case study of the vulnerability of OTP implemented in internet banking systems of South Korea”, An International Journal Springer Science+Business Media New York 2014, 10.1007/s11042-014-1888-3, 2014.