Securing User Authentication with Visual Cryptography Techniques

Abstract

The paper focuses on developing an advanced authentication mechanism to counteract the growing threat of keylogging attacks. Keylogging, a type of cyber-attack that captures keystrokes to steal sensitive information, poses a significant risk to traditional authentication methods that rely on keyboard input.

This paper introduces a novel security approach combining two key innovations: a dual-keypad input system and a visual authentication protocol. The dual-keypad system consists of two separate input keypad (Normal Keypad and Virtual Keypad), each responsible for a different aspect of the authentication process. This separation complicates the ability for key loggers to capture complete authentication sequences, thereby enhancing security.

Simultaneously, the visual authentication component introduces a dynamic, graphical verification process that complements the dual-keypad system. Users interact with visual elements—such as images or patterns—displayed on a screen, which are not susceptible to keylogging. This adds an additional layer of authentication that is both user-friendly and resistant to data capture by malicious software.

The integration of these two systems creates a multi-layered defence strategy. The dual-keypad mechanism reduces the risk of compromised keystrokes, while the visual authentication process ensures that even if keystrokes are captured, the authentication remains secure. The paper aims to deliver a robust, secure, and intuitive authentication solution that enhances protection against keylogging and other cyber threats, providing a reliable means of securing sensitive information in various applications.

Country : India

1 Asst. Prof. P. B. Chandane2 Omkar Lahane3 Ajinkya Makone4 Dipali Kshirsagar5 Sakshi Kolate

  1. Department of Computer Engineering, Adsul's Technical Campus, Chas, Maharashtra, India
  2. Department of Computer Engineering, Adsul's Technical Campus, Chas, Maharashtra, India
  3. Department of Computer Engineering, Adsul's Technical Campus, Chas, Maharashtra, India
  4. Department of Computer Engineering, Adsul's Technical Campus, Chas, Maharashtra, India
  5. Department of Computer Engineering, Adsul's Technical Campus, Chas, Maharashtra, India

IRJIET, Volume 9, Issue 5, May 2025 pp. 514-519

doi.org/10.47001/IRJIET/2025.905060

References

  1. Chandramouli, R., & Memon, N. (2019). "Analysis of LSB based image steganography techniques." Proceedings of the IEEE International Conference on Image Processing, 2001, 3, 1019-1022.
  2. Naor, M., & Shamir, A. (2018). "Visual cryptography." Advances in Cryptology - EUROCRYPT '94, 950, 1-11.
  3. Mishra, A. K., & Singh, S. (2016). "A Review on Image Steganography Techniques." International Journal of Computer Applications, 139(3), 1-5.
  4. Khan, M. A., & Ghosh, S. (2015). "A Survey of Image Steganography Techniques." International Journal of Computer Applications, 111(8), 1-6.
  5. Saha, S., & Gupta, D. (2014). "A New Image Steganography Technique Using Visual Cryptography." International Journal of Advanced Research in Computer Science and Software Engineering, 4(8), 879-883.