© 2013, IJARCSSE All Rights Reserved Effective Password Authentication System Using Optical Character Recognition
© 2013, IJARCSSE All Rights Reserved Effective Password Authentication System Using Optical Character Recognition
net/publication/263280706
CITATIONS READS
0 1,353
2 authors:
All content following this page was uploaded by Sreekanth Reddy on 23 June 2014.
Abstract-- The Security experts recently quoted that user is “THE WEAKEST LINK IN THE CHAIN” of security
system. In order to prevent the user being the weakest link, USABILITY & SECURITY [3] concept has emerged
where, both the security as well usability are given equal importance. This paper proposes a new authentication
scheme which uses the Optical Character Recognition (OCR) [2] as a base, to improve usability as well as security. In
the proposed scheme user selects a word of his/her choice from a textual image and that word is converted to text and
stored as a password. By doing this we can overcome the dictionary attack and we can have more password space
compared to traditional text passwords. In order to gain access, the user has to select the same word at the time of
Login. The entire process of OCR is done based on Semi Continuous Hidden Markov Model (SC-HMM) proposed by
Jose` A. Rodri` et.al [1] best used for OCR. Compared to other graphical passwords, using OCR takes less time.
1. INTRODUCTION
Security has been a wide area of research where one’s privacy for data is indeed the most important aspect. In
order to keep the user data secure, many authentication techniques have been proposed. Unfortunately each and every type of
authentication has its own advantages and disadvantages. None of the authentication techniques have fulfilled all the
requirements of the security as well as the user’s needs. Different authentication procedures have been introduced ranging
from
Knowledge based authentication (Alphanumeric passwords, Graphical passwords).
Token based authentication.
Biometric based authentication.
These are called the “3-factors of authentication”.
Alphanumeric passwords (Text passwords) are the most commonly used passwords for authentication. Most of the
problems that user’s have with this method are related to the memorability of passwords.
Furthermore, today users have different passwords for computers, networks, web sites, and more. In addition, some
computer systems require frequent password changes. So, users use Weak Passwords to reduce the memory burden.
Weak Passwords are passwords that are easily guessable and are easy to crack. Table 1 shows the list of guessable
passwords according to Bernie Thomas et.al [6].
The best alternative is to choose Strong Passwords instead of weak passwords.
Strong passwords are those that use all possible strengthening options: such as use of at least 8 characters, use of
multiple upper case and multiple lower case letters (A-Z, a-z), use of multiple special characters (~`!@#$%^&*()_-
+={[}]|\:;"'<,>.?/) and use of numbers (0-9). Using these options the security will be very high and it even takes more
time to (may be a lifetime) to crack the password. The purpose of a strong password is to make the password harder to
crack or guess, and more secure.
In Recall Based method user is forced to reproduce or select the exact thing which he/she selected or reproduced
earlier during the registration phase. Both these methods have memory advantage over the traditional alphanumeric
passwords.
Jermyn, et al. [8] Proposed a scheme, called “Draw - a - secret (DAS)”, which allows the user to draw their
password (figure 2). A user is asked to draw a simple picture on a 2D grid. The coordinates of the grids occupied by the
picture are stored in the order of the drawing. During authentication, the user is asked to re-draw the picture. If the drawing
touches the same grids in the same sequence, then the user is authenticated. Jermyn, et al. Suggested that given reasonable-
length passwords in a 5 X 5 grid, the full password space of DAS are larger than that of the full text password space.
This paper proposes a new recall based authentication scheme where the user selects the exact same word which he/she
selected earlier during the registration phase. For high speed and accurate results we are using OCR for providing
authentication.
Using the above formula we are going to calculate the distances between two vectors, after the distance
calculation, the vector is placed in the appropriate class of alphabets based on the distance acquired. Consider if a part of
the image is inputted to DTW and the distance is closer to the alphabet S then that inputted word will be recognized as S.
Finally in the post-processing the output of the Classification stage is converted into ISCII or ASCII so that the
converted words, alphabets, paragraphs are reconstructed from the previously stored templates. The entire process of OCR
is represented in fig 3.
In figure 4 user selected the word “using” that word is converted to text using OCR and saved as password.
At the time of login user have to enter his/her username then the image stored under that username is explicitly provided to
the user. The user then has to select the same exact word which he/she has selected earlier at the time of registration. Here
we are using an invisible rectangle to avoid spoofing (shoulder surfing attack) then the selected word is converted to text
again using OCR and then compared with the stored password if both the words are matched then the user is authenticated
else the user is prompted to login again.
4. USABILITY AND SECURITY METRICS
The proposed scheme aims to improve the usability while providing the maximum security so as to satisfy both the
criteria’s. Some of the metrics for usability and security are considered for analysis and they are as follows:
4.1 Usability Metrics:
Memorability: Extent to which a user can remember his / her password after a period of time. (Usually 1-4
weeks).
Login time: Time taken to login using a particular authentication system.
Creation Time: Time taken to create a password using an authentication system.
Login Success Rate: Percentage of those users are able to successfully login after particular no. of login
attempts.
4.2 Security Metrics:
Total Password Space: Total number of possible values in a password system.
Shoulder Surfing: The extent to which someone can look over the shoulder of a person entering his / her
password and guess his / her password.
Here proposed scheme maintains constant login time but PCCP raises to 30sec in week III & week IV same are shown
in fig 5.
Coming to creation time our proposed scheme performed well compared to PCCP and the main advantage here is the
speed of OCR method. The comparison is shown in fig 6.
Registration Time
30
Time in Seconds
20
10
PCCP
0
OCR
PCCP 80%
OCR 85%
Almost two schemes performed well over the success rate but proposed scheme slightly tends to be good over
PCCP.
86%
84%
82%
80%
78%
76%
PCCP OCR
OCR 6.5x108
In table 6, 104 represents that if the word selected for password containing less than or equal to 4-letters and 108 represents if
the word selected contains less than or equal to 8-letters and 6.5 is the default image size.
5.2.2 Shoulder surfing attack:
The proposed OCR scheme is not vulnerable to shoulder surfing attack. This was achieved through the invisible
rectangle used at the time of login to select the word. Fig 8 shows the same where user selected the word “using” and the
user is verified successfully but the selected word is not visible to the adversary. Even though, an adversary observes the
login window, he/she will not be able to see the selected word. So, the proposed scheme is resistant to shoulder surfing
attack.
ACKNOWLEDGMENT
We are especially indebted to AICTE-RPS (Research Promotion Scheme) for providing us an environment
where we can work to the best we can. We would also like to thank Mr. Raj Mohammed Mohd, research scholar who has
helped in the design, development, testing and implementation of this proposed scheme.
REFERENCES
1. Jose´ A. Rodrı´guez-Serrano and Florent Perronnin. “A Model-Based Sequence Similarity in Application to
Handwritten Word Spotting” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 34, NO. 11,
November 2012, Page. no: 2108-2120.
2. “Optical Character Recognition” http://en.wikipedia.org/wiki/Optical_character_recogntion.
3. Lorrie Faith Cranor, Simson Garfinkel “Security and Usability: Designing secure systems.”
4. Xiaoyuan Suo Ying Zhu G. Scott. Owen “Graphical Passwords: A Survey”.
5. Sonia Chiasson, Elizabeth Stobert, Alain Forget, “Persuasive Cued Click-Points: Design, Implementation, and
Evaluation of a Knowledge-Based Authentication Mechanism” IEEE Transactions On Dependable And Secure
Computing, Vol. 9, No. 2, March/April 2012, Page. no: 222-235.
6. Bernie Thomas “Simple Formula for Strong Passwords (SFSP)” 2005.
7. R. Dhamija and A. Perrig, "Deja Vu: A User Study Using Images for Authentication," in Proceedings of the
9th USENIX Security Symposium, 2000.
8. I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, "The Design and Analysis of Graphical
Passwords," in Proceedings of the 8th USENIX Security Symposium, 1999.
9. Greg E. Blonder (1996). U.S. Patent No. 5559961.