View : 676 Download: 0

Full metadata record

DC Field Value Language
dc.contributor.author채기준*
dc.contributor.author도인실*
dc.date.accessioned2018-11-30T16:30:07Z-
dc.date.available2018-11-30T16:30:07Z-
dc.date.issued2017*
dc.identifier.isbn9781509051243*
dc.identifier.issn1976-7684*
dc.identifier.otherOAK-23657*
dc.identifier.urihttps://dspace.ewha.ac.kr/handle/2015.oak/247118-
dc.description.abstractTraditional password conversion scheme for user authentication is to transform the passwords into hash values. These hash-based password schemes are comparatively simple and fast because those are based on text and famed cryptography. However, those can be exposed to cyber-Attacks utilizing password by cracking tool or hash-cracking online sites. Attackers can thoroughly figure out an original password from hash value when that is relatively simple and plain. As a result, many hacking accidents have been happened predominantly in systems adopting those hash-based schemes. In this work, we suggest enhanced password processing scheme based on image using visual cryptography (VC). Different from the traditional scheme based on hash and text, our scheme transforms a user ID of text type to two images encrypted by VC. The user should make two images consisted of subpixels by random function with SEED which includes personal information. The server only has user's ID and one of the images instead of password. When the user logs in and sends another image, the server can extract ID by utilizing OCR (Optical Character Recognition). As a result, it can authenticate user by comparing extracted ID with the saved one. Our proposal has lower computation, prevents cyber-Attack aimed at hash-cracking, and supports authentication not to expose personal information such as ID to attackers. © 2017 IEEE.*
dc.description.sponsorshipNational Research Foundation of Korea*
dc.languageEnglish*
dc.publisherIEEE Computer Society*
dc.subjecthash*
dc.subjectimage-based password scheme*
dc.subjectvisual cryptography*
dc.titleEnhanced password processing scheme based on visual cryptography and OCR*
dc.typeConference Paper*
dc.relation.indexSCOPUS*
dc.relation.startpage254*
dc.relation.lastpage258*
dc.relation.journaltitleInternational Conference on Information Networking*
dc.identifier.doi10.1109/ICOIN.2017.7899514*
dc.identifier.scopusid2-s2.0-85018357893*
dc.author.googleYang D.*
dc.author.googleDoh I.*
dc.author.googleChae K.*
dc.contributor.scopusid채기준(7102584247)*
dc.contributor.scopusid도인실(14029666900;56765572600)*
dc.date.modifydate20240322133135*
Appears in Collections:
인공지능대학 > 컴퓨터공학과 > Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

BROWSE