IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET151183                                                     

Secure Internet Banking with Visual Authentication Protocol


Saraswathi. R, Shanmathi. G, Preethi. P, Arul. U
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
Keylogging or keyboard capturing, is the action of recording (or logging) the keys struck on a keyboard typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. It also has very legitimate uses in studies of human-computer interaction. There are numerous keylogging methods ranging from hardware and software-based approaches Involving human in authentication protocols, while promising, is not easy because of their limited capability of computation and memorization. We demonstrate how careful visualization design can enhance not only the security but also the usability of authentication. We propose two visual authentication protocols: one is a one-time-password protocol, and the other is a password-based authentication protocol. Our approach for real-world deployment: we were able to achieve a high level of usability while satisfying stringent security requirements.

Saraswathi. R, Shanmathi. G, Preethi. P, Arul. U

Authentication, QR code,Android mobile, keylogger

  1. A. Hiltgen, T. Kramp, and T. Weigold. Secure internet bankingauthentication. IEEE Security and Privacy, 4:21–29, March 2006.

  2. A. Slowinska and H. Bos. Pointless tainting?: evaluating the practicalityof pointer tainting. In Proc. of ACM EuroSys, pages 61–74, 2009. 

  3. B. Parno, C. Kuo, and A. Perrig. Phoolproof phishing prevention. InProc. of Financial Cryptography, pages 1–19, 2006.

  4.  E. Hayashi, R. Dhamija, N. Christin, and A. Perrig. Use your illusion: secure authentication usable anywhere. In Proc. of ACM SOUPS, 2008.

  5. E. Rescorla. SSL and TLS: designing and building secure systems. Addison-Wesley, 2001.

  6. H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: capturing system-wide information flow for malware detection

  7. J. M. McCune, A. Perrig, and M. K. Reiter. Seeing-is-believing: Using camera phones for human-verifiable authentication. In Proc. of IEEE Symposium on Security and Privacy, pages 110–124, 2005.

  8. N. Hopper and M. Blum. Secure human identification protocols. In Proc. of ASIACRYPT, 2001. Communications of the ACM, 24(11):770–772, 1981.


Publication Details

Published in : Volume 1 | Issue 1 | January-Febuary - 2015
Date of Publication Print ISSN Online ISSN
2015-02-25 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
351-353 IJSRSET151183   Technoscience Academy

Cite This Article

Saraswathi. R, Shanmathi. G, Preethi. P, Arul. U, "Secure Internet Banking with Visual Authentication Protocol", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 1, pp.351-353, January-Febuary-2015.
URL : http://ijsrset.com/IJSRSET151183.php