We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Highly Secure Authentication Scheme

by Ushir Kishori N, R.b.joshi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 108 - Number 14
Year of Publication: 2014
Authors: Ushir Kishori N, R.b.joshi
10.5120/18983-0422

Ushir Kishori N, R.b.joshi . Highly Secure Authentication Scheme. International Journal of Computer Applications. 108, 14 ( December 2014), 35-38. DOI=10.5120/18983-0422

@article{ 10.5120/18983-0422,
author = { Ushir Kishori N, R.b.joshi },
title = { Highly Secure Authentication Scheme },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 108 },
number = { 14 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 35-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume108/number14/18983-0422/ },
doi = { 10.5120/18983-0422 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:43:01.391583+05:30
%A Ushir Kishori N
%A R.b.joshi
%T Highly Secure Authentication Scheme
%J International Journal of Computer Applications
%@ 0975-8887
%V 108
%N 14
%P 35-38
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The increased level of effective security control and transaction fraud in the world of electronic and internet commerce, demands for highly secured identification and personal verification systems. The Knowledge based authentication system encourage to user in selecting password for high security. For high security application the proposed scheme presents an integrated evaluation of the graphical password scheme by using persuasive cued click points, including usability and security evaluations, and implementation considerations along with the biometric authentication using finger nail plate surface. It implements the graphical passwords scheme to improvise the difficulty level of guessing it along with the biometric authentication which is very convenient and efficient method by acquiring low resolution images of nail plate surface which is the outermost part of the nail unit. The contour and texture characteristics of nail plates from three fingers (Index, Middle and Ring) are represented by the appearance and shape based feature descriptors. To implement these we use the technique of score level rules for fusion and classifier based fusion of matching scores by employing decision tree and support vector machine. The objective is to provide highly secure authentication scheme by using user name with graphical password using persuasive cued click points along with biometric authentication using finger nail plate. The scope of the scheme is limited to three fingers only and also for high security purpose where it is very important to keep tight security like military application, forensic labs, civilian, banking applications, etc.

References
  1. Amioy Kumar, Shruti Garg, M. Hanmandlu, "Biometric authentication using finger nail plates," Proc in Expert Systems with Applications 41 373–386 Elsevier at sciencedirect, 2014.
  2. S Chiasson,, E. Stobert, A. Forget, "Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism,"Proc. IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 2, March/April 2012.
  3. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, "PassPoints: Design and Longitudinal Evaluation of a Graphical Password System," Int'l J. Human Computer Studies, vol. 63, nos. 1/2, pp. 102-127, 2005.
  4. S. Chiasson, P. van Oorschot, and R. Biddle, "Graphical Password Authentication Using Cued Click Points," Proc. European Symp. Research in Computer Security (ESORICS), pp. 359-374, Sept. 2007.
  5. D. Zhang, W. K. Kong, J. You, and M. Wong, "Online palmprint identification," IEEE Trans. Pattern Analysis and Machine Intelligence, Vol. 25 (9), pp. 1041-1050, 2003.
  6. N. Ratha, and R. Bolle, Automatic Fingerprint Recognition Systems, Springer, 2004.
  7. A. Kumar and Ch. Ravikanth,"Personal authentication using finger knuckle surface," IEEE Trans. Info. Forensics & Security, vol. 4, no. 1,pp. 98-110, Mar. 2009.
  8. Bartlett, M. S. , Movellan, J. R. , & Sejnowski, T. J. "Face recognition by independent component analysis," Proc in IEEE Transactions on Neural Networks, 13(6), 2002
  9. Shruti Garg, Amioy Kumar, and M. Hanmandlu, "Finger Nail Plate: A New Biometric Identifier,"Proc in International Journal of Computer Information Systems and Industrial Management Applications. Volume 6 (2014) pp. ISSN 2150-7988, 126 – 138.
  10. Shruti Garg, Amioy Kumar, and M. Hanmandlu, "Biometric Authentication Using Finger nail surface,"Proc in IEEE 2012
Index Terms

Computer Science
Information Sciences

Keywords

Biometric Authentication Graphical Password Finger Nail Plate security Persuasive Cued Click-Points.