Abstract
Most typical authentication mechanisms in this digitized world use a username and password to protect information. Two-factor authentication (2FA) mechanisms were introduced to add an extra layer of security. As 2FA is vulnerable to advanced attacks such as real-time replay, multifactor authentications (MFA) are being introduced and require multiple factors or proofs of identity during authentication. Thus, herein, we propose a multifactor authentication methodology using text-based encryption with a self-generated algorithm-Twine and image encryption with GENETIC algorithms. In our approach, when a user attempts to register on a Web page, they must enter details along with essential user id and password, further taking them to an image selection page where they can choose the image of their choice as a second layer of the authentication protocol. Hence, when a user attempts a login into the portal, they can be provided with options to enter via a graphical or text-based password depending on the feasibility and usage of the Web page. The introduction of a lightweight cryptographic algorithm here ensures an improbable zone for machine guessing strategies, and an innovative component for the user’s password, since both graphical and textual, will be hashed and stored and will have no permanent space in the database. It is observed that graphical passwords are easier to use and remembrance. Hence, this could be the next revolution in admin panels for multitude of security driven purposes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bhandari A, Tripathy BK, Jawad K, Bhatia S, Rahmani MKI, Mash A (2022) Cancer detection and prediction using genetic algorithms. Comput Intell Neurosci 2022:18. https://doi.org/10.1155/2022/1871841
Sasikumar G, Tripathy BK (2010) Innovative applications of digital image processing. In: Proceedings of National conference on recent advances in neural network (NCRANN 2010), pp A-6
Tripathy BK, Sooraj TR, Mohanty RK (2019) Rough set and soft set models in image processing. In: Bhattacharyya S, Pan I, Das A, Gupta S (eds) Intelligent multimedia data analysis. De Gruyter, Berlin, Boston, pp 123–144
Narayanan B (2019) Secure authentication using dynamic grid pair technique and image authentication. Doctoral dissertation, Dublin, National College of Ireland
Tripathy BK, Chandramoulli PVSSR (2016) Computer graphics and applications. Ane Books Private Limited, Chennai. ISBN: 9789385462047
Katsini C, Raptis GE, Fidas C, Avouris N (2018) Does image grid visualization affect password strength and creation time in graphical authentication? In: Proceedings of the 2018 International conference on advanced visual interfaces, pp 1–5
Parmar H, Nainan N, Thaseen S (2012) Generation of secure one-time password based on image authentication. J Comput Sci Inf Technol 7:195–206
Takada T, Yoshida M (2021) Pict-place authentication: recognition-based graphical password using image layout for better balance of security and operation time. In: CHItaly 2021: 14th Biannual conference of the Italian SIGCHI Chapte, pp 1–7
Calanda FB, Sison AM, Molato MRD, Medina RP (2019) Simple and secured password hiding technique for image-based authentication using a least significant bit based embedding scheme. In: 2019 IEEE 4th International conference on technology, informatics, management, engineering & environment (TIME-E). IEEE, pp 32–36
Mohanty M, Yaqub W (2020) Towards seamless authentication for Zoom-based online teaching and meeting. arXiv preprint arXiv:2005.10553
Ponmani E, Indhuja S, Puviarasi R, Saravanan P, Ananthakrishnan S (2018) An enhanced least significant bit steganography to improve the effectiveness of graphical password authentication. Int J Pure Appl Math 119(12):13325–13335
Zabidi NS, Norowi NM, Rahmat RWO (2018) A usability evaluation of image and emojis in graphical password. Int J Eng Technol 7(4.31):400–407
Hamid S, Bawany NZ, Khan S (2019) AcSIS: authentication system based on image splicing. Eng Technol Appl Sci Res 9(5):4808–4812
Ghori F, Abbasi K (2013) Secure user authentication using graphical passwords. J Independent Stud Res 11(2):34
Mohamad Z, Thong LY, Zakaria AH, Awang WSW (2018) Image based authentication using zero-knowledge protocol. In: 2018 4th ICCTA. IEEE, pp 202–210
Khankari NB, Kale GV (2020) One time password generation for multifactor authentication using graphical password. Int J Eng Res Gen Sci 3(5):489–494
Katsini C, Fidas C, Raptis GE, Belk M, Samaras G, Avouris N (2018) Influences of human cognition and visual behavior on password strength during picture password composition. In: Proceedings of the 2018 CHI conference on human factors in computing systems, pp 1–14
Bianchi A, Oakley I, Kim H (2019) PassBYOP: bring your own picture for securing graphical passwords. IEEE Trans Human-Machine Syst 46(3):380–389
Mackie I, Yıldırım M (2018) A novel hybrid password authentication scheme based on text and image. In: IFIP Annual conference on data and applications security and privacy. Springer, Cham, pp 182–197
Kadhum RN, Ali NHM (2022) Using steganography techniques for implicit authentication to enhance sensitive data hiding. Int J Nonlinear Anal Appl 13(1):4001–4011
Alia MA, Hnaif AA, Abdalla AM, Maria EMA (2018) An improved authentication scheme based on graphical passwords. ICIC Express Lett 12(8):775–783
Mishra GS, Mishra PK, Nand P, Astya R (2020) User authentication: a three level password authentication mechanism. J Phys Conf Ser 1712(1):012005
Irfan K, Anas A, Malik S, Amir S (2018) Text based graphical password system to obscure shoulder surfing. In: 2018 IBCAST. IEEE, pp 422–426
Lu D, Huang D, Deng Y, Alshamrani A (2018) Multi factor user authentication with in-air-handwriting and hand geometry. In: 2018 International conference on biometrics (ICB). IEEE, pp 255–262
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Verma, S., Singh, M., Chaturvedi, K., Tripathy, B.K. (2023). An Efficient Multifactor Authentication System. In: Das, A.K., Nayak, J., Naik, B., Vimal, S., Pelusi, D. (eds) Computational Intelligence in Pattern Recognition. CIPR 2022. Lecture Notes in Networks and Systems, vol 725. Springer, Singapore. https://doi.org/10.1007/978-981-99-3734-9_10
Download citation
DOI: https://doi.org/10.1007/978-981-99-3734-9_10
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-3733-2
Online ISBN: 978-981-99-3734-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)