0% found this document useful (0 votes)
7 views1 page

A Secure One-Time Password Authentication

This paper presents a novel one-time password (OTP) authentication scheme that utilizes image texture features to enhance security against common attacks such as eavesdropping and brute forcing. By extracting features from randomly selected areas of an image and employing symmetric key cryptography, the proposed method generates unique OTPs for user login, making it both convenient and computationally efficient. The approach aims to provide a high level of security for network applications requiring reliable authentication processes.

Uploaded by

Dhiraj Dhane
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views1 page

A Secure One-Time Password Authentication

This paper presents a novel one-time password (OTP) authentication scheme that utilizes image texture features to enhance security against common attacks such as eavesdropping and brute forcing. By extracting features from randomly selected areas of an image and employing symmetric key cryptography, the proposed method generates unique OTPs for user login, making it both convenient and computationally efficient. The approach aims to provide a high level of security for network applications requiring reliable authentication processes.

Uploaded by

Dhiraj Dhane
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

A Secure One-Time Password Authentication

Scheme Using Image Texture Features

Maitreya Maity1, Dhiraj Manohar Dhane1(&), Tushar Mungle1,


Rupak Chakraborty2, Vasant Deokamble3,
and Chandan Chakraborty1
1
School of Medical Science and Technology,
Indian Institute of Technology, Kharagpur, India
[email protected]
2
Department of Information Technology, DIT University, Dehradun, India
3
Department of E & TC, Marathwada Mitra Mandal’s College of Engineering,
Pune, India

Abstract. The internet is a big giant in the today’s world playing the backbone
for information and communication technologies. Most of the network appli-
cation needs a very reliable and one-way authentication process to ensure sys-
tem resources are securely accessed by authorised users over the Internet.
Password-based authentication is the most common mechanism and is easy to
implement for authentication purpose. However, such general scheme will be
vulnerable to attackers to steal the static credential combination with ease using
eavesdropping, brute forcing, password replay, etc. One-time password (OTP) is
the promising solutions to overcome from such attacks. It generates the different
unique passwords each time for the user login into the system. This paper
proposes a novel method of OTP authentication using image features. Here the
system calculates different features from randomly selected areas of an image
and applies symmetric key cryptography to generate the random OTP for the
user. The proposed approach is convenient and computationally less expensive
offering high-level security.

Keywords: One-time password  Texture feature  Authentication  Feature


extraction  Encryption

1 Introduction

The password based authentication is a most frequently used authentication protocol in


today’s era. Since its induction till recent, the password-based authentication has not
been toppled by any other approach. The superiority of a network system depends on
upon a number of attacks resisted. The attack may be from inside the system or from
outside external entity [1]. This paper deals with the prevention of external attacks
using one-time password (OTP) approach. OTP system helps in preventing a replay of
password attack.
S/Keys is one of the most popular examples of OTP authentication. Here, the user
will select one seed value (k) and a random number (N) for computing the hash value.

© Springer Nature Singapore Pte Ltd. 2016


P. Mueller et al. (Eds.): SSCC 2016, CCIS 625, pp. 283–294, 2016.
DOI: 10.1007/978-981-10-2738-3_24

You might also like