Authentication by cued recall on image recognition
dc.contributor.advisor | Vichit Lorchirachoonkul | th |
dc.contributor.author | Kanthima Kongsathitsuwan | th |
dc.date.accessioned | 2022-04-12T03:22:41Z | |
dc.date.available | 2022-04-12T03:22:41Z | |
dc.date.issued | 2015 | th |
dc.date.issuedBE | 2558 | th |
dc.description | Thesis (Ph.D. (Computer Science and Information Systems))--National Institute of Development Administration, 2015 | th |
dc.description.abstract | Graphical passwords have been studied by a variety of methods. According to the psychological beliefs, human can remember an image better than text. Therefore, clicking on a graphical password is easier than typing a text password. Moreover, graphical password can avoid the limitation of text password. This research introduces a method for improving the security of authentication by using a blurred image with a cue as a graphical password that is an integration of recognition-based graphical password and cued-recall based graphical passwords together. The objective of this research was to compare the recall and guessing rates of the proposed scheme with the recall rate and the guessing rate of the Use Your Illusion (UYI) scheme. The proposed method randomly selects a new set of images every time from the user register database when a registered user logs ins. The aim was to reduce the chance of an attacker guessing the correct graphical password. Furthermore, this research utilized the Diffie-Hellman algorithm to compute the position of the secret image. The secret image was used to merge with the selected graphical password. The research also utilized a hash algorithm to create a graphic digest for resisting the message masquerade and reducing the transmission time. This proposed scheme utilized SSL/TLS to maintain security. | th |
dc.description.abstract | Based on the simulation study, the findings indicated that the recall rate of the proposed scheme was better than the recall rate of the UYI scheme and the system login time was lower with the proposed graphical passwords with UYI graphical passwords. However, the guessing rates of these schemes were very similar. | th |
dc.format.extent | 66 leaves | th |
dc.format.mimetype | application/pdf | th |
dc.identifier.doi | 10.14457/NIDA.the.2015.55 | |
dc.identifier.other | b192778 | th |
dc.identifier.uri | https://repository.nida.ac.th/handle/662723737/5726 | th |
dc.language.iso | eng | th |
dc.publisher | National Institute of Development Administration | th |
dc.rights | This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. | th |
dc.subject.other | Cued-recall | th |
dc.title | Authentication by cued recall on image recognition | th |
dc.type | text--thesis--doctoral thesis | th |
mods.genre | Dissertation | th |
mods.physicalLocation | National Institute of Development Administration. Library and Information Center | th |
thesis.degree.department | School of Applied Statistics | th |
thesis.degree.discipline | Computer Science and Information Systems | th |
thesis.degree.grantor | National Institute of Development Administration | th |
thesis.degree.level | Doctoral | th |
thesis.degree.name | Doctor of Philosophy | th |
Files
Original bundle
1 - 1 of 1