Secure Internet Banking with Visual Authentication Protocol

Authors(4) :-Saraswathi. R, Shanmathi. G, Preethi. P, Arul. U

Keylogging or keyboard capturing, is the action of recording (or logging) the keys struck on a keyboard typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. It also has very legitimate uses in studies of human-computer interaction. There are numerous keylogging methods ranging from hardware and software-based approaches Involving human in authentication protocols, while promising, is not easy because of their limited capability of computation and memorization. We demonstrate how careful visualization design can enhance not only the security but also the usability of authentication. We propose two visual authentication protocols: one is a one-time-password protocol, and the other is a password-based authentication protocol. Our approach for real-world deployment: we were able to achieve a high level of usability while satisfying stringent security requirements.

Authors and Affiliations

Saraswathi. R
Dhanalakshmi College of Engineering, Kancheepuram District, Tamilnadu, India
Shanmathi. G
Dhanalakshmi College of Engineering, Kancheepuram District, Tamilnadu, India
Preethi. P
Dhanalakshmi College of Engineering, Kancheepuram District, Tamilnadu, India
Arul. U
Dhanalakshmi College of Engineering, Kancheepuram District, Tamilnadu, India

Authentication, QR code,Android mobile, keylogger

  1. A. Hiltgen, T. Kramp, and T. Weigold. Secure internet bankingauthentication. IEEE Security and Privacy, 4:21–29, March 2006.

  2. A. Slowinska and H. Bos. Pointless tainting?: evaluating the practicalityof pointer tainting. In Proc. of ACM EuroSys, pages 61–74, 2009. 

  3. B. Parno, C. Kuo, and A. Perrig. Phoolproof phishing prevention. InProc. of Financial Cryptography, pages 1–19, 2006.

  4.  E. Hayashi, R. Dhamija, N. Christin, and A. Perrig. Use your illusion: secure authentication usable anywhere. In Proc. of ACM SOUPS, 2008.

  5. E. Rescorla. SSL and TLS: designing and building secure systems. Addison-Wesley, 2001.

  6. H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: capturing system-wide information flow for malware detection

  7. J. M. McCune, A. Perrig, and M. K. Reiter. Seeing-is-believing: Using camera phones for human-verifiable authentication. In Proc. of IEEE Symposium on Security and Privacy, pages 110–124, 2005.

  8. N. Hopper and M. Blum. Secure human identification protocols. In Proc. of ASIACRYPT, 2001. Communications of the ACM, 24(11):770–772, 1981.

Publication Details

Published in : Volume 1 | Issue 1 | January-Febuary 2015
Date of Publication : 2015-02-25
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 351-353
Manuscript Number : IJSRSET151183
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Saraswathi. R, Shanmathi. G, Preethi. P, Arul. U, " Secure Internet Banking with Visual Authentication Protocol, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 1, pp.351-353, January-Febuary-2015.
Journal URL : http://ijsrset.com/IJSRSET151183

Article Preview

Follow Us

Contact Us