Open Access

ARTICLE

An Enhanced Graphical Authentication Scheme Using Multiple-Image Steganography

Khalil Hamdi Ateyeh Al-Shqeerat*
Department of Computer Science, College of Computer, Qassim University, Saudi Arabia
* Corresponding Author: Khalil Hamdi Ateyeh Al-Shqeerat. Email:

Computer Systems Science and Engineering 2023, 44(3), 2095-2107. https://doi.org/10.32604/csse.2023.028975

Received 22 February 2022; Accepted 25 March 2022; Issue published 01 August 2022

Abstract

Most remote systems require user authentication to access resources. Text-based passwords are still widely used as a standard method of user authentication. Although conventional text-based passwords are rather hard to remember, users often write their passwords down in order to compromise security. One of the most complex challenges users may face is posting sensitive data on external data centers that are accessible to others and do not be controlled directly by users. Graphical user authentication methods have recently been proposed to verify the user identity. However, the fundamental limitation of a graphical password is that it must have a colorful and rich image to provide an adequate password space to maintain security, and when the user clicks and inputs a password between two possible grids, the fault tolerance is adjusted to avoid this situation. This paper proposes an enhanced graphical authentication scheme, which comprises benefits over both recognition and recall-based graphical techniques besides image steganography. The combination of graphical authentication and steganography technologies reduces the amount of sensitive data shared between users and service providers and improves the security of user accounts. To evaluate the effectiveness of the proposed scheme, peak signal-to-noise ratio and mean squared error parameters have been used.

Keywords

Security; graphical authentication; steganography; peak signal to noise ratio; mean squared error

Cite This Article

K. H. A. Al-Shqeerat, "An enhanced graphical authentication scheme using multiple-image steganography," Computer Systems Science and Engineering, vol. 44, no.3, pp. 2095–2107, 2023.



This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 403

    View

  • 213

    Download

  • 0

    Like

Share Link

WeChat scan