Abstract

Contents

Introduction

With the development of information technologies and the emergence of global computer networks access to information much easier. In this regard, along with the performance issues and reliability of information systems, the acute problem of the threats of data security breaches in the absence of their protection, namely the protection of information from unauthorized access.

In the information systems is stored, processed, circulating various information loss or distortion that may cause significant harm [1]. To avoid such situations, it is important to protect the data from any threats of a technical nature. It is necessary to choose the most effective way to protect information using graphical password systems.

the Graphical passwords are the most reliable method to use user authentication in computer and communication systems. They consist of any action that the user performs on the image. Such passwords are easier to remember, but they are vulnerable to voyeurism.

1 Timeliness of the topic

Currently, the problem of the organization of authorized access to information resources is becoming more urgent, therefore constantly searches for new methods, algorithms and authentication protocols as a first line of defense. Today the mandatory procedures of information systems are an identification procedure – recognition and user authentication – user authentication. As a user can act as a legitimate user and an attacker. A person or process performing unauthorized access to information, are violators of the rules of differentiation of access.

To eliminate the possibility of unauthorized access, gain control of the confidentiality of the information introduced various systems to establish the authenticity of objects and access. The basis for the construction of such systems laid down the principle of tolerance and performing such accesses to information in which there are corresponding signs of separation of powers.

One of the mechanisms of information security in information systems is the access control mechanism, performing the authorization check of the objects of the information system to access network resources. At the core of data access control is a system of differentiation of access of users to protected information [2].

2 The purpose and objectives of the study, expected outcomes

Objective: improving reliability of the identification/authentication of users through the use of the systems of graphical password.

To achieve this goal it is planned to undertake the following tasks:

  1. perform the different models increase the resistance of the password systems.
  2. Explore the possibility of using steganography methods in password systems.
  3. Develop a model regulation authorized access users using graphical password.
  4. On the developed models to implement the algorithms and software modules of the system to control access to information.
  5. Explore the possibility of applying a digital watermark in a graphical password systems.
  6. Develop a model regulation authorized user access with the use of graphical password based on the digital watermark.

So the result of the work, it is planned to obtain a model of differentiation of access to information on the basis of the method of graphical password based on digital watermarks (DWM). The model will improve user authorization and create a more stable system of identification/authentication of users. The use of this model will allow the user to quickly remember passwords and to increase durability of the systems of identification/authentication to hacks by attackers.

3. Overview of research and development

Currently actively being developed in the field of graphical passwords, which provide new technologies in identification/authentication of users. The technology is based on the user's selection of the specific locations in a graphic object, or select a particular sequence of graphical objects, simplify the authorization of the user and will possess certain advantages over existing methods of identification and authentication[3].

3.1 Overview of international sources

Currently actively being developed in the field of graphical passwords, which provide new technologies in identification/authentication of users. I would like to highlight some foreign experts the field: V. Loncar[4], and A. Lashkari[5, P. Wiedenbeck[6], V. Kumar[7] and others. Technologies considered in the work of these authors simplify the user authorization and provide certain advantages over existing methods of identification and authentication[3].

4 Description of the system a graphical password

Picture password — type password, where the user matches some pattern with pre-selected gestures. When using this password the operating system you are trying to log in, evaluates the introduced graphic signs with pre-defined, and thus either allows or prohibits access to the materials.

In fact, a picture password consists of two components:

The User chooses a picture that will help you better remember the password, and decides which parts are the most interesting. The set of gestures often stand out of the line and the circle. The additional security parameter is the direction of movement of the hand while painting. After all, when drawing a circle or line on the selected picture, Windows remembers how they were drawn. So whoever is trying to reproduce your picture password needs to know not only the selected part of the image and the procedure for their allocation, but also the direction and start and end points of drawn lines and circles.

After the user has selected an image, it is formed by the grid. The longest side of the image is divided into 100 segments, then splits the short side and mesh on which the gestures are drawn. Single point gestures defined by their coordinates (x, y) on the grid. Remembered for the line start and end coordinates and their order used to determine the direction of drawing the line. Remember to circle the coordinates of the center point, radius and direction. Remember to touch coordinates of the touch point.

When you try to perform registration by using the graphical password, the gestures are compared to a set of gestures that are entered when setting up picture password. The difference between each gesture and decide the success of the authentication on the basis of the number of errors. If a gesture type is wrong (should be round and instead a line), authentication fails. If the types of gestures, the order of the input and the direction coincide, it is checked how these gestures differ from those previously entered, and a decision is made to authenticate[8].

5 Model steganographic digital watermarks

Steganography system or stegosystem - a set of tools and methods used to build the covert channel information transfer.

When you build stegosystem should take into account the following provisions:

At the moment computer steganography includes several areas of study:

The Greatest interest is digital watermarking. They are used for marking electronic files, and to embed and transmit various information via communication channels.

Thus, it is possible to allocate urgent task for the application of digital watermarking, which consists in authenticating the user when the condition of resistance to the imposition of false reports by the offender and the impact of accidental and intentional errors in the communication channels. In the course of finding a solution to this problem requires the use of methods of control of authenticity based on digital watermarks and use of both single and multiple types of digital watermarks.

Model user authentication system based on digital watermarking is shown in Fig.4:

Model of user authentication based on digital watermarking

Figure 4 – Model for user authentication based on digital watermarking
(animation: 10 frames, 7 cycles of repeating, 32 KB)

The Algorithm for user authentication based on digital watermarks:

  1. the Sender creates a document that imposes a digital watermark, unique to each sender, which is converted in the encoder to a convenient form for incorporation into assure message.
  2. driver certified communications design watermark is embedded in the document using the confidential key.
  3. In the channel to the certified message identified by the address the offender, as well as accidental and intentional interference. As a result, the impact on the reception device checks the watermark receives the modified message.

The algorithm for detecting a digital watermark formed its assessment. The authenticity of the document is determined in accordance with this assessment. Thus possible solutions are the following:

When forming the evaluation watermark, you may experience the error detection by the receiver of the message.

In this model, under the digital watermarking refers to the embedding of certain information about the user and his password to a specific resource. Information is encoded and is embedded in a sequence of image files. The user selects a sequence file and confirming the choice. The system of this sequence extracts the digital watermark, which contains the user name and password, if the sequence is correct, the user opens the resource, otherwise the access to a protected resource will be closed until until the sequence is correct [10].

Conclusion

As a result of the research work were collected and studied materials on issues related to the theme of master's work.

Based On the analysis of existing methods of identification/authentication of the users identified disadvantages of commonly used systems. The analysis allowed to conclude that the use of systems of graphical passwords with the use of steganographic methods increases the security of systems protecting information and information systems in General. Through the use of digital watermarks in the systems of graphical password attacks on these systems become more complex to implement and significantly different from the attacks on commonly used character system.

Comments

At the time of writing this abstract master's work is not yet complete. Estimated completion date: may 2018 the Full text of work and materials on the subject can be obtained from author or his supervisor after the specified date.

List of sources

  1. Попков С. М., Назарова К. Е., Мартынова Л. Е., Ковалев С. А., Никишова А. В. Основные виды графических парольных систем и подходов к их реализации // Молодой ученый. — 2016. — №22. — С. 4-8. URL:https://moluch.ru/archive/126/34960/.
  2. Средства опознания и разграничения доступа к информации – Режим доступа: https://infopedia.su/3x77c9.html.
  3. Научная библиотека диссертаций и авторефератов disserCat – Режим доступа: http://www.dissercat.com....
  4. Vanita Lonkar et al. Int. Journal of Engineering Research and Applications / ISSN : 2248-9622, Vol. 4, Issue 11(Version - 5), November 2014, pp. 81–87.
  5. A. H. Lashkari, F. T., “Graphical User Authentication (GUA),” 2010: Lambert Academic Publisher.
  6. Wiedenbeck, S., J.-C. Birget, and A. Brodskiy,” Authentication Using Graphical Passwords:Effects of Tolerance and Image Choice, “ in Symposium On Usable Privacy and Security (SOUPS). 2005.
  7. Kumar, V., et al., Click to Zoom-inside Graphical Authentication , in International Conference on Digital Image Processing. 2009, IEEE.
  8. Безопасность планшета. Аутентификация на планшете – Режим доступа: http://planshet-info.ru/index.php....
  9. Грибунин В. Г., Оков И. Н., Туринцев И. В. Цифровая стеганография // - М.: Солон-Пресс, 2002.
  10. Ефремченко И. А., Губенко Н. Е. Особенности модели аутентификации на основе ЦВЗ для разработки систем графического пароля. // Информатика, управляющие системы, математическое и компьютерное моделирование в рамках III форума «Инновационные перспективы Донбасса» (ИУСМКМ – 2017): VIII Международная научно-техническая конференция, 25 мая 2017, г. Донецк: / Донец. национал. техн. ун-т; редкол. Ю.К. Орлов и др. – Донецк: ДонНТУ, 2017. – с. 163–166.