Abstract
Contents
- Introduction
- 1 Timeliness of the topic
- 2 The purpose and objectives of the study, expected outcomes <
- 3 Overview of research and development
- 3.1 Overview of international sources
- 4 System description picture password
- 5 Model of steganographic system CEH
- Insights
- List of sources
Introduction
With the development of information technologies and the emergence of global computer networks access to information much easier. In this regard, along with the performance issues and reliability of information systems, the acute problem of the threats of data security breaches in the absence of their protection, namely the protection of information from unauthorized access.
In the information systems is stored, processed, circulating various information loss or distortion that may cause significant harm [1]. To avoid such situations, it is important to protect the data from any threats of a technical nature. It is necessary to choose the most effective way to protect information using graphical password systems.
the Graphical passwords are the most reliable method to use user authentication in computer and communication systems. They consist of any action that the user performs on the image. Such passwords are easier to remember, but they are vulnerable to voyeurism.
1 Timeliness of the topic
Currently, the problem of the organization of authorized access to information resources is becoming more urgent, therefore constantly searches for new methods, algorithms and authentication protocols as a first line of defense. Today the mandatory procedures of information systems are an identification procedure – recognition and user authentication – user authentication. As a user can act as a legitimate user and an attacker. A person or process performing unauthorized access to information, are violators of the rules of differentiation of access.
To eliminate the possibility of unauthorized access, gain control of the confidentiality of the information introduced various systems to establish the authenticity of objects and access. The basis for the construction of such systems laid down the principle of tolerance and performing such accesses to information in which there are corresponding signs of separation of powers.
One of the mechanisms of information security in information systems is the access control mechanism, performing the authorization check of the objects of the information system to access network resources. At the core of data access control is a system of differentiation of access of users to protected information [2].
2 The purpose and objectives of the study, expected outcomes
Objective: improving reliability of the identification/authentication of users through the use of the systems of graphical password.
To achieve this goal it is planned to undertake the following tasks:
- perform the different models increase the resistance of the password systems.
- Explore the possibility of using steganography methods in password systems.
- Develop a model regulation authorized access users using graphical password.
- On the developed models to implement the algorithms and software modules of the system to control access to information.
- Explore the possibility of applying a digital watermark in a graphical password systems.
- Develop a model regulation authorized user access with the use of graphical password based on the digital watermark.
So the result of the work, it is planned to obtain a model of differentiation of access to information on the basis of the method of graphical password based on digital watermarks (DWM). The model will improve user authorization and create a more stable system of identification/authentication of users. The use of this model will allow the user to quickly remember passwords and to increase durability of the systems of identification/authentication to hacks by attackers.
3. Overview of research and development
Currently actively being developed in the field of graphical passwords, which provide new technologies in identification/authentication of users. The technology is based on the user's selection of the specific locations in a graphic object, or select a particular sequence of graphical objects, simplify the authorization of the user and will possess certain advantages over existing methods of identification and authentication[3].
3.1 Overview of international sources
Currently actively being developed in the field of graphical passwords, which provide new technologies in identification/authentication of users. I would like to highlight some foreign experts the field: V. Loncar[4], and A. Lashkari[5, P. Wiedenbeck[6], V. Kumar[7] and others. Technologies considered in the work of these authors simplify the user authorization and provide certain advantages over existing methods of identification and authentication[3].
4 Description of the system a graphical password
Picture password — type password, where the user matches some pattern with pre-selected gestures. When using this password the operating system you are trying to log in, evaluates the introduced graphic signs with pre-defined, and thus either allows or prohibits access to the materials.
In fact, a picture password consists of two components:
- images from your collection of figures;
- a set of lines (gesture) that you put over the image.
The User chooses a picture that will help you better remember the password, and decides which parts are the most interesting. The set of gestures often stand out of the line and the circle. The additional security parameter is the direction of movement of the hand while painting. After all, when drawing a circle or line on the selected picture, Windows remembers how they were drawn. So whoever is trying to reproduce your picture password needs to know not only the selected part of the image and the procedure for their allocation, but also the direction and start and end points of drawn lines and circles.
After the user has selected an image, it is formed by the grid. The longest side of the image is divided into 100 segments, then splits the short side and mesh on which the gestures are drawn. Single point gestures defined by their coordinates (x, y) on the grid. Remembered for the line start and end coordinates and their order used to determine the direction of drawing the line. Remember to circle the coordinates of the center point, radius and direction. Remember to touch coordinates of the touch point.
When you try to perform registration by using the graphical password, the gestures are compared to a set of gestures that are entered when setting up picture password. The difference between each gesture and decide the success of the authentication on the basis of the number of errors. If a gesture type is wrong (should be round and instead a line), authentication fails. If the types of gestures, the order of the input and the direction coincide, it is checked how these gestures differ from those previously entered, and a decision is made to authenticate[8].
5 Model steganographic digital watermarks
Steganography system or stegosystem - a set of tools and methods used to build the covert channel information transfer.
When you build stegosystem should take into account the following provisions:
- if the enemy somehow finds out about the existence of a hidden message, it should not allow him to retrieve these messages in other data as long as the key is kept secret;
- potential enemy must be stripped of any technical and other advantages in recognition or disclosure of the content of secret messages[9].
The enemy has a full understanding of the steganographic system and the details of its implementation. The only information that remains unknown to a potential enemy, is the key by which only the holder can establish the fact of presence and the contents of the hidden message.
At the moment computer steganography includes several areas of study:
- integration of information with the aim of hidden transfer;
- embedding a digital watermark, in particular for copyright protection on electronic products such as video, audio and graphic files in electronic form;
- embedding headers.
- embedding identification numbers.
The Greatest interest is digital watermarking. They are used for marking electronic files, and to embed and transmit various information via communication channels.
Thus, it is possible to allocate urgent task for the application of digital watermarking, which consists in authenticating the user when the condition of resistance to the imposition of false reports by the offender and the impact of accidental and intentional errors in the communication channels. In the course of finding a solution to this problem requires the use of methods of control of authenticity based on digital watermarks and use of both single and multiple types of digital watermarks.
Model user authentication system based on digital watermarking is shown in Fig.4:
The Algorithm for user authentication based on digital watermarks:
- the Sender creates a document that imposes a digital watermark, unique to each sender, which is converted in the encoder to a convenient form for incorporation into assure message.
- driver certified communications design watermark is embedded in the document using the confidential key.
- In the channel to the certified message identified by the address the offender, as well as accidental and intentional interference. As a result, the impact on the reception device checks the watermark receives the modified message.
The algorithm for detecting a digital watermark formed its assessment. The authenticity of the document is determined in accordance with this assessment. Thus possible solutions are the following:
- the authenticity of the message is confirmed;
- the authenticity of the message is not confirmed;
- the fragment is most likely genuine;
- the fragment is likely imposed or distorted noise transmission.
When forming the evaluation watermark, you may experience the error detection by the receiver of the message.
In this model, under the digital watermarking refers to the embedding of certain information about the user and his password to a specific resource. Information is encoded and is embedded in a sequence of image files. The user selects a sequence file and confirming the choice. The system of this sequence extracts the digital watermark, which contains the user name and password, if the sequence is correct, the user opens the resource, otherwise the access to a protected resource will be closed until until the sequence is correct [10].
Conclusion
As a result of the research work were collected and studied materials on issues related to the theme of master's work.
Based On the analysis of existing methods of identification/authentication of the users identified disadvantages of commonly used systems. The analysis allowed to conclude that the use of systems of graphical passwords with the use of steganographic methods increases the security of systems protecting information and information systems in General. Through the use of digital watermarks in the systems of graphical password attacks on these systems become more complex to implement and significantly different from the attacks on commonly used character system.
Comments
At the time of writing this abstract master's work is not yet complete. Estimated completion date: may 2018 the Full text of work and materials on the subject can be obtained from author or his supervisor after the specified date.
List of sources
- Попков С. М., Назарова К. Е., Мартынова Л. Е., Ковалев С. А., Никишова А. В. Основные виды графических парольных систем и подходов к их реализации // Молодой ученый. — 2016. — №22. — С. 4-8. URL:https://moluch.ru/archive/126/34960/.
- Средства опознания и разграничения доступа к информации – Режим доступа: https://infopedia.su/3x77c9.html.
- Научная библиотека диссертаций и авторефератов disserCat – Режим доступа: http://www.dissercat.com....
- Vanita Lonkar et al. Int. Journal of Engineering Research and Applications / ISSN : 2248-9622, Vol. 4, Issue 11(Version - 5), November 2014, pp. 81–87.
- A. H. Lashkari, F. T., “Graphical User Authentication (GUA),” 2010: Lambert Academic Publisher.
- Wiedenbeck, S., J.-C. Birget, and A. Brodskiy,” Authentication Using Graphical Passwords:Effects of Tolerance and Image Choice, “ in Symposium On Usable Privacy and Security (SOUPS). 2005.
- Kumar, V., et al., Click to Zoom-inside Graphical Authentication , in International Conference on Digital Image Processing. 2009, IEEE.
- Безопасность планшета. Аутентификация на планшете – Режим доступа: http://planshet-info.ru/index.php....
- Грибунин В. Г., Оков И. Н., Туринцев И. В. Цифровая стеганография // - М.: Солон-Пресс, 2002.
- Ефремченко И. А., Губенко Н. Е. Особенности модели аутентификации на основе ЦВЗ для разработки систем графического пароля. // Информатика, управляющие системы, математическое и компьютерное моделирование в рамках III форума «Инновационные перспективы Донбасса» (ИУСМКМ – 2017): VIII Международная научно-техническая конференция, 25 мая 2017, г. Донецк: / Донец. национал. техн. ун-т; редкол. Ю.К. Орлов и др. – Донецк: ДонНТУ, 2017. – с. 163–166.