Professional Documents
Culture Documents
Download International Conference On Innovative Computing And Communications Proceedings Of Icicc 2021 Volume 1 Advances In Intelligent Systems And Computing 1387 Ashish Khanna Editor online ebook texxtbook full chapter pdf
Download International Conference On Innovative Computing And Communications Proceedings Of Icicc 2021 Volume 1 Advances In Intelligent Systems And Computing 1387 Ashish Khanna Editor online ebook texxtbook full chapter pdf
https://ebookmeta.com/product/international-conference-on-
innovative-computing-and-communications-proceedings-of-
icicc-2021-volume-3-1st-edition-ashish-khanna/
https://ebookmeta.com/product/intelligent-computing-proceedings-
of-the-2021-computing-conference-volume-1-1st-edition-kohei-arai/
https://ebookmeta.com/product/intelligent-computing-proceedings-
of-the-2021-computing-conference-volume-2-lecture-notes-in-
networks-and-systems-284-kohei-arai-editor/
Intelligent Computing Proceedings of the 2021 Computing
Conference Volume 3 Lecture Notes in Networks and
Systems 285 Kohei Arai (Editor)
https://ebookmeta.com/product/intelligent-computing-proceedings-
of-the-2021-computing-conference-volume-3-lecture-notes-in-
networks-and-systems-285-kohei-arai-editor/
https://ebookmeta.com/product/soft-computing-for-problem-solving-
proceedings-of-socpros-2020-volume-1-advances-in-intelligent-
systems-and-computing-1392-aruna-tiwari-editor/
https://ebookmeta.com/product/soft-computing-for-security-
applications-proceedings-of-icscs-2021-advances-in-intelligent-
systems-and-computing-1397-g-ranganathan-editor/
https://ebookmeta.com/product/computational-vision-and-bio-
inspired-computing-proceedings-of-iccvbic-2021-advances-in-
intelligent-systems-and-computing-1420-s-smys-editor/
Advances in Intelligent Systems and Computing 1387
International
Conference
on Innovative
Computing and
Communications
Proceedings of ICICC 2021, Volume 1
Advances in Intelligent Systems and Computing
Volume 1387
Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland
Advisory Editors
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing,
Universidad Central de Las Villas, Santa Clara, Cuba
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
Hani Hagras, School of Computer Science and Electronic Engineering,
University of Essex, Colchester, UK
László T. Kóczy, Department of Automation, Széchenyi István University,
Gyor, Hungary
Vladik Kreinovich, Department of Computer Science, University of Texas
at El Paso, El Paso, TX, USA
Chin-Teng Lin, Department of Electrical Engineering, National Chiao
Tung University, Hsinchu, Taiwan
Jie Lu, Faculty of Engineering and Information Technology,
University of Technology Sydney, Sydney, NSW, Australia
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute
of Technology, Tijuana, Mexico
Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro,
Rio de Janeiro, Brazil
Ngoc Thanh Nguyen , Faculty of Computer Science and Management,
Wrocław University of Technology, Wrocław, Poland
Jun Wang, Department of Mechanical and Automation Engineering,
The Chinese University of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications
on theory, applications, and design methods of Intelligent Systems and Intelligent
Computing. Virtually all disciplines such as engineering, natural sciences, computer
and information science, ICT, economics, business, e-commerce, environment,
healthcare, life science are covered. The list of topics spans all the areas of modern
intelligent systems and computing such as: computational intelligence, soft comput-
ing including neural networks, fuzzy systems, evolutionary computing and the fusion
of these paradigms, social intelligence, ambient intelligence, computational neuro-
science, artificial life, virtual worlds and society, cognitive science and systems,
Perception and Vision, DNA and immune based systems, self-organizing and
adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics
including human-machine teaming, knowledge-based paradigms, learning para-
digms, machine ethics, intelligent data analysis, knowledge management, intelligent
agents, intelligent decision making and support, intelligent network security, trust
management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are
primarily proceedings of important conferences, symposia and congresses. They
cover significant recent developments in the field, both of a foundational and
applicable character. An important characteristic feature of the series is the short
publication time and world-wide distribution. This permits a rapid and broad
dissemination of research results.
Indexed by DBLP, INSPEC, WTI Frankfurt eG, zbMATH, Japanese Science and
Technology Agency (JST).
All books published in the series are submitted for consideration in Web of Science.
International Conference
on Innovative Computing
and Communications
Proceedings of ICICC 2021, Volume 1
Editors
Ashish Khanna Deepak Gupta
Maharaja Agrasen Institute of Technology Department of Computer Science
Rohini, Delhi, India and Engineering
Maharaja Agrasen Institute of Technology
Siddhartha Bhattacharyya Rohini, Delhi, India
Department of Computer Science
and Engineering Aboul Ella Hassanien
CHRIST (Deemed to be University) Faculty of Computers and Information
Bangalore, Karnataka, India Cairo University
Giza, Egypt
Sameer Anand
Department of Computer Science Ajay Jaiswal
Shaheed Sukhdev College of Business Department of Computer Science
Studies Shaheed Sukhdev College of Business
Rohini, Delhi, India Studies
Rohini, Delhi, India
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature
Singapore Pte Ltd. 2022
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether
the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse
of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by similar
or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or
the editors give a warranty, expressed or implied, with respect to the material contained herein or for any
errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Dr. Ashish Khanna would like to dedicate this
book to his mentors Dr. A. K. Singh and
Dr. Abhishek Swaroop for their constant
encouragement and guidance and his family
members including his mother, wife, and kids.
He would also like to dedicate this work to
his (Late) father Sh. R. C. Khanna with
folded hands for his constant blessings.
Dr. Deepak Gupta would like to dedicate this
book to his father Sh. R. K. Gupta, his mother
Smt. Geeta Gupta for their constant
encouragement, his family members
including his wife, brothers, sisters, kids, and
to my students close to my heart.
Prof. (Dr.) Siddhartha Bhattacharyya would
like to dedicate this book to Late Kalipada
Mukherjee and Late Kamol Prova Mukherjee.
Prof. (Dr.) Aboul Ella Hassanien would like
to dedicate this book to his wife Nazaha
Hassan.
Dr. Sameer Anand would like to dedicate this
book to his Dada Prof. D. C. Choudhary, his
beloved wife Shivanee, and his son Shashwat.
Dr. Ajay Jaiswal would like to dedicate this
book to his father Late Prof. U. C. Jaiswal,
his mother Brajesh Jaiswal, his beloved wife
Anjali, his daughter Prachii, and his
son Sakshaum.
ICICC-2021 Steering Committee Members
Patrons:
General Chairs:
Honorary Chairs:
Conference Chairs:
vii
viii ICICC-2021 Steering Committee Members
Editorial Chairs:
Conveners:
Publication Chairs:
Publicity Chairs:
Co-Convener:
Organizing Chairs:
Organizing Team:
cloud computing, although given the diverse areas of research reported might not
have been always possible.
ICICC-2021 invited seven keynote speakers, who are eminent researchers in the
field of computer science and engineering, from different parts of the world. In addi-
tion to the plenary sessions on each day of the conference, ten concurrent technical
sessions are held every day to assure the oral presentation of around 210 accepted
papers. Keynote speakers and session chair(s) for each of the concurrent sessions
have been leading researchers from the thematic area of the session. A technical
exhibition is held during the 2 days of the conference, which has put on display the
latest technologies, expositions, ideas, and presentations. The research part of the
conference was organized in a total of 28 special sessions and 3 international work-
shops. These special sessions and international workshops provided the opportunity
for researchers conducting research in specific areas to present their results in a more
focused environment.
An international conference of such magnitude and release of the ICICC-2021
proceedings by Springer has been the remarkable outcome of the untiring efforts
of the entire organizing team. The success of an event undoubtedly involves the
painstaking efforts of several contributors at different stages, dictated by their devo-
tion and sincerity. Fortunately, since the beginning of its journey, ICICC-2021 has
received support and contributions from every corner. We thank them all who have
wished the best for ICICC-2021 and contributed by any means toward its success. The
edited proceedings volumes by Springer would not have been possible without the
perseverance of all the steering, advisory, and technical program committee members.
All the contributing authors owe thanks to the organizers of ICICC-2021 for their
interest and exceptional articles. We would also like to thank the authors of the papers
for adhering to the time schedule and for incorporating the review comments. We wish
to extend my heartfelt acknowledgment to the authors, peer-reviewers, committee
members, and production staff whose diligent work put shape to the ICICC-2021
proceedings. We especially want to thank our dedicated team of peer-reviewers who
volunteered for the arduous and tedious step of quality checking and critique on
the submitted manuscripts. We wish to thank my faculty colleagues Mr. Moolchand
Sharma and Ms. Prerna Sharma for extending their enormous assistance during the
conference. The time spent by them and the midnight oil burnt is greatly appreciated,
for which we will ever remain indebted. The management, faculties, administrative,
and support staff of the college have always been extending their services whenever
needed, for which we remain thankful to them.
Lastly, we would like to thank Springer for accepting our proposal for publishing
the ICICC-2021 conference proceedings. Help received from Mr. Aninda Bose, the
acquisition senior editor, in the process has been very useful.
xiii
xiv Contents
Dr. Deepak Gupta received a B.Tech. degree in 2006 from the Guru Gobind Singh
Indraprastha University, India. He received M.E. degree in 2010 from Delhi Tech-
nological University, India and Ph.D. degree in 2017 from Dr. APJ Abdul Kalam
Technical University, India. He has completed his Post-Doc from Inatel, Brazil.
With 13 years of rich expertise in teaching and two years in the industry; he focuses
on rational and practical learning. He has contributed massive literature in the fields
of Intelligent Data Analysis, BioMedical Engineering, Artificial Intelligence, and
Soft Computing. He has served as Editor-in-Chief, Guest Editor, Associate Editor
in SCI and various other reputed journals (IEEE, Elsevier, Springer, & Wiley). He
has actively been an organizing end of various reputed International conferences.
He has authored/edited 50 books with National/International level publishers (IEEE,
xix
xx About the Editors
Elsevier, Springer, Wiley, Katson). He has published 180 scientific research publi-
cations in reputed International Journals and Conferences including 94 SCI Indexed
Journals of IEEE, Elsevier, Springer, Wiley and many more.
Prof. Aboul Ella Hassanien is the Founder and Head of the Egyptian Scientific
Research Group (SRGE) and a Professor of Information Technology at the Faculty
of Computer and Artificial Intelligence, Cairo University. Professor Hassanien is an
ex-dean of the faculty of computers and information, Beni Suef University. Professor
Hassanien has more than 800 scientific research papers published in prestigious inter-
national journals and over 40 books covering such diverse topics as data mining,
medical images, intelligent systems, social networks, and smart environment. Prof.
Hassanien won several awards, including the Best Researcher of the Youth Award of
Astronomy and Geophysics of the National Research Institute, Academy of Scien-
tific Research (Egypt, 1990). He was also granted a scientific excellence award in
humanities from the University of Kuwait for the 2004 Award and received the scien-
tific - University Award (Cairo University, 2013). Also, He was honored in Egypt
as the best researcher at Cairo University in 2013. He was also received the Islamic
Educational, Scientific and Cultural Organization (ISESCO) prize on Technology
(2014) and received the State Award for excellence in engineering sciences 2015.
He was awarded the medal of Sciences and Arts of the first class by the President of
the Arab Republic of Egypt, 2017.
Quoc Hung Nguyen, Thanh Le, Ha Quang Dinh Vo, and Viet Phuong Truong
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 1
A. Khanna et al. (eds.), International Conference on Innovative Computing
and Communications, Advances in Intelligent Systems and Computing 1387,
https://doi.org/10.1007/978-981-16-2594-7_1
2 Q. H. Nguyen et al.
1 Introduction
2 Literature Review
Next is the optimized and most used virtualization technology in recent times,
VMWare virtualization technology [9] developed by the company VMWare, which
supports virtualization from the hardware level. User-friendly interface, simple to
install and use, many advanced features, support for multiple operating systems,
diverse versions. This technology is often applied to large units like banks and is
rarely used for commercial VPS sold in the market. Its structure is a virtualization
application program, running on Linux or Windows operating systems.
In the study of HE Yu et al. [10], the authors proposed a solution to automatically
build bridges connecting computing nodes into clusters for parallel processing (MPI–
–Message Passing Interface) using Docker Cluster [11]. This work has also been
carried out by De Bayser et al. [12] to integrate computation in parallel MPI with
HPC systems using Docker. It is important to evaluate efficiency when it comes
to virtualizing the computational system as a basis for building HPC. Muhammad
Abdullah et al. at Punjab University, Pakistan conducted a study [13] to evaluate the
effectiveness when using VMs (Virtual Machines) and Docker on the OpenNebula
cloud service platform. The results showed that when deploying virtualization with
Docker, the performance reached 70.23% compared to 46.48% of VMs, thereby
proving effective when virtualizing using Docker.
In Vietnam, several studies in the field of HPC have been carried out [14].
Researchers of Center for Computing Engineering, University of Technology—
Vietnam National University Ho Chi Minh City, aims at building solutions and
techniques used in the field of high performance and looking to build a tool that
can evaluate the performance of a powerful computer system, and achieved perfor-
mance in the range of 30–90%. The results were published in “500 of the world’s most
powerful computers” [15]. In project [16], Nguyen Thanh Thuy et al. at the High-
Performance Computing Center, Hanoi University of Technology, by the protocol of
scientific and technological cooperation with the Indian government in the period of
2004–2005, he has proposed to build an HPC system, namely BKluster. BKluster is
a system of parallel clustered computing based on Beowulf architecture and message
communication programming model together with the BKlusware software suite, a
set of software that supports up to many users at many different levels.
For the vHPC performance calculation system [18], Docker images with Storage
Containers for each specific problem will be built, and the system provides informa-
tion about each Docker images. The part that interacted with the outside through the
IP address is authenticated through the HTTPS protocol if the system runs internally.
When doing the work outside, tasks will be connected to the system via VPN. All
the procedures are illustrated in Fig. 5.
Building Virtual High-Performance Computing Clusters with Docker … 7
4 Conclusions
Virtualization technology has been developed a long time ago, achieved many
achievements, and commonly used for server systems. In addition to flexibility
in deployment, virtual machines are also known for the characteristics such as
ease of management, high security, and efficiency in isolation between the scope
of use and control. Currently, in the field of high-performance computing, virtual
machine deployment infrastructure plays an important role in services such as cloud
computing, and cloud storage. In this research, we have discussed and tested several
virtualization technologies for servers that are integrated with a large computational
memory such as CPU and GPU toward an HPC system with superior features, scala-
bility, and higher reliability. On the other hand, it helps researchers to have the tools
to implement algorithms to solve hard problems such as computer vision [19, 20],
machine learning [21], and big data processing [22] in all different environments to
meet technical factors such as high availability, superior fault tolerance feature, and
especially, utilizing the existing resources.
Acknowledgements This work was supported by the University of Economics Ho Chi Minh City
under project CS-2020-14.
References
1. Lee, H. (2014). Virtualization basics: Understanding techniques and fundamentals. In: School
of Informatics and Computing Indiana University 815 E 10th St. Bloomington IN 47408.
2. Khattar, R. K., Murphy, M. S., Tarella, G. J., & Nystrom, K. E. (1999). Introduction to Storage
Area Network. SAN: IBM Corporation, International Technical Support Organization.
3. Bhanage, G., Seskar, I., Zhang, Y., Raychaudhuri, D., & Jain, S. (2011). Experimental evalua-
tion of openvz from a testbed deployment perspective. Development of Networks and Commu-
nities. In volume 46 of Lecture Notes of the Institute for Computer Sciences, Social Informatics
and Telecommunications Engineering (pp. 103–112). Berlin: Springer.
4. Jin, Y., Wen, Y., Chen, Q. (2012). Energy efficiency and server virtualization in data centers:
An empirical investigation. In 2012 Proceedings IEEE INFOCOM Workshops (pp. 133–138).
5. Performance Report Hyper-V (2010). White Paper: https://sp.ts.fujitsu.com/.
6. Kusnetzky, D. (2011). Virtualization: A Manager’s Guide. O’Reilly Media, Inc.
7. I. Habib. (2008, February). Virtualization with KVM. Linux Journal, 2008(166), 8. Article
No.: 8.
8. Chisnall, D. (2013). The Definitive Guide to the Xen Hypervisor (1st ed.). USA: Prentice Hall
Press.
9. Technical Papers. VMware Infrastructure Architecture Overview. White Paper. https://www.
vmware.com/pdf/vi_architecture_wp.pdf.
10. Yu, H. E., & Huang, W. (2015). Building a virtual hpc cluster with auto scaling by the docker.
arXiv:1509.08231.
11. Rad, B. B., Bhatti, H. J., & Ahmadi, M. (2017). An introduction to docker and analysis of
its performance. International Journal of Computer Science and Network Security (IJCSNS),
17(3), 228.
Building Virtual High-Performance Computing Clusters with Docker … 9
12. de Bayser, M., & Cerqueira, R. (2017). Integrating MPI with docker for HPC. In 2017 IEEE
International Conference on Cloud Engineering (IC2E), Vancouver, BC, 2017 (pp. 259–265).
https://doi.org/10.1109/IC2E.2017.40.
13. Abdullah, M., Iqbal, W., & Bukhari, F. (2019). Containers vs virtual machines for auto-scaling
multi-tier applications under dynamically increasing workloads (pp. 153–167). https://doi.org/
10.1007/978-981-13-6052-7_14.
14. Hung, N. Q., Phung, T. K., Hien, P., & Thanh, D. N. H. (2021) AI and blockchain: Potential
and challenge for building a smart E-learning system in vietnam. In IOP Conference Series:
Materials Science and Engineering (In press).
15. Tran Thoai N., et al (2016). Research and design a 50–100 TFlops high performance computing
system / University of Technology - Viet Nam National University HCMC, Project in HCM
City.
16. Thuy, N. T., et al. (2006). Research high-performance computational systems and apply micro-
material simulation. Project in Ministry of Science and Technology (MOST), 2004–2005.
17. Tan, G., Yeo, G. K., Turner, S. J., & Teo, Y. M. (Eds.). (2013). AsiaSim 2013: 13th International
Conference on Systems Simulation, Singapore, November 6–8, 2013. Proceedings (Vol. 402).
18. Petitet, R. C. W. A., Dongarra, J., Cleary, A. HPL - A portable implementation of the high-
performance linpack benchmark for distributed-memory computers. http://www.netlib.org/ben
chmark/hpl
19. Thanh, D. N. H. & Dvoenko, S. D. (2019). A denoising of biomedical images. International
Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, XL-5/W6,
73–78.
20. Kumar, V., Mishra, B. K., Mazzara, M., Thanh, D. N. H., & Verma, A. (2020). Prediction of
Malignant and benign breast cancer: A data mining approach in healthcare applications. In:
Borah, S., Emilia Balas, V., & Polkowski, Z. (Eds.), Advances in Data Science and Management.
Lecture Notes on Data Engineering and Communications Technologies (Vol. 37). Singapore:
Springer.
21. Erkan, U. (2020). A precise and stable machine learning algorithm: eigenvalue classifica-
tion (EigenClass). Neural Computing and Applications. https://doi.org/10.1007/s00521-020-
05343-2(Inpress)
22. Fowdur, T. P., Beeharry, Y., Hurbungs, V., Bassoo, V., & Ramnarain-Seetohul, V. (2018). Big
data analytics with machine learning tools. In: Dey, N., Hassanien, A., Bhatt, C., Ashour, A.,
& Satapathy, S. (Eds.), Internet of Things and Big Data Analytics Toward Next-Generation
Intelligence. Studies in Big Data (Vol. 30). Cham: Springer.
Implementing Multilevel Graphical
Password Authentication Scheme
in Combination with One Time Password
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 11
A. Khanna et al. (eds.), International Conference on Innovative Computing
and Communications, Advances in Intelligent Systems and Computing 1387,
https://doi.org/10.1007/978-981-16-2594-7_2
12 T. Srinivasa Ravi Kiran et al.
1 Introduction
Even though the technique of using textual passwords is insecure, the majority of
the digital systems are still using textual passwords to implement their security. To
overcome the vulnerabilities of using textual-based passwords, graphical passwords
provide a promising solution to implement better security [1]. A graphical password
is an authentication method that facilitates the user to select from images or symbols
in a precise order on the existing graphical user interface (GUI). People are using
passwords commonly, many times to facilitate online banking transactions, for the
access of social networks and to verify their emails [2].
The most popular way of identifying user authenticity is the use of one time pass-
word [3]. One time passwords are intended to be a top-secret between two parties
and can be used once within the limited time lapse. This prevents someone from
looking over your shoulder and trying to use it later for network sniffing and from
spyware attacks [4]. The password strength of a graphical password scheme is more
than the text-based schemes, and as a result, it provides a superior level of secu-
rity. Owing to this benefit, there is an increasing interest in graphical password. In
graphical password schemes, images or symbols are used as an alternative to alphanu-
merical passwords [5]. The graphical password schemes that are offered protect the
user and/or application privileges from the attempts of hacking [6]. According to
Wiedenbeck et al. [7] unforgettable places depend on the type of image and the
defined sequence of click locations. Chopra et al. [8] present potential outcomes in
terms of security, ease of use and memorability.
2 Related Works
grid. For example, if the password selected is “6Tg:” then choose the combinations,
viz., “6Tg”, “Tg6”, “g:6” and “:6T”. The combinations chosen successfully form
a triangular pattern on the existing interface independently. The user is required to
identify the triangle with the chosen password combinations in the specified order
for authentication. In line with Kiran et al. [11] the users are instructed to recog-
nize quadruplets formed from the password blends on the existing interface from the
password chosen at the time of registration.
Kiran et al. [11] presented a graphical password authentication scheme resistant to
peeping attack which begins with recognizing quadruplets formed from the password
combination chosen from the client, starting with the first character and rotating one
character toward the right in a way that the last character in the password combination
comes into view as the first character of the password combination. For instance, if
the password chosen at the time of registration is “Sa3T:” then the quadruplets formed
are “Sa3TS”, “a3T:a”, “3T:S3”, “T:SaT” and “:Sa3:”. It is compulsory for the user
to select the arrangement of the password blends in the expected fashion rotated for
every login attempt. Ravi Kiran et al. [12] presented a new, interactive, recall-based
scheme where the user starts with identifying the required transformation applied
to every individual character of password amalgamation. Prasad et al. [3] illustrate
that an authentication schema resistant from peeping attack starts with identifying
triangle formed by clicking on the buttons of the interface have colors red, green,
blue and red of the grid, respectively.
Rao et al. [13] proposed the PPC schema. In this, the user is instructed to symbolize
a rectangle on the accessible interface. Any character existing on the edge of the
rectangle may be the pass character. Jusoh et al. [14] exemplify a relative study
of recognition-based authentication algorithms. The comparisons are based on very
important characteristics like usability, weaknesses and security attacks. For better
usability, Stobert et al. [15] suggest that many click-points could be used on smart-
phone displays since it is very difficult to display larger image sizes. Hemavathy
et al. [16] proposed an innovative graphical password authentication system to resist
shoulder surfing. As a part of authentication, the users are instructed to choose the
appropriate horizontal and vertical lines on the pass matrix to find out the pass objects.
Khadke et al. [17] conveyed that the security of the graphical password can be
imposed at multiple levels. Katsini et al. [18] discussed implications to improve
recognition-based graphical passwords by adopting personalization techniques
derived from individual cognitive characteristics.
3 Projected Scheme
time password, then the login attempt is successful. Suppose a triangle does not form,
then that blend can be overlooked. In previous studies, verification is at a single level
only, that is, the user is expected to identify the required triangle with password
combinations. However, in the proposed work, novelty is achieved in a manner that
the user authentication is carried out at multiple levels in such a way that the user
is expected to validate one time password after the required triangle is identified for
better security.
Permutations of secrete phrase are input by four taps on the displayed screen.
For example, if the secret phrase selected at the sign-up time is “g5:G”, at that point
the plausible triangle shaped by tapping on the cells are “g5:g”, “5:G5”, “:Gg:” and
“Gg5G”, that is, pivoting unique secret key character blend one position from left
to right every time and the first character must be the same as the last character.
The users are instructed to enter the combination of password blend cyclically in the
expected order for every login stab.
Algorithm
1. Start.
2. Register a password of length four.
3. Select five distinct four-character amalgamations of registered passwords,
pivoting from left to right.
4. The user makes an entry attempt by selecting the password amalgamation in the
predicted way on the accessible display.
Implementing Multilevel Graphical Password Authentication … 15
5. If the client opts for correct password amalgamation in an expected manner and
it forms a triangle, then a one time password is sent to the hand-held device and
that one time password is verified on the interface.
6. If the one time password entered on the interface is correct, the login attempt
is successful; otherwise, the login attempt is failed, so evaluate the next
amalgamation.
7. In case if the client does not choose a secret token combination in the expected
style or does not form a triangle shape, the entry process is obstructed, so
disregard that amalgamation of secret tokens and opt next amalgamation of
secret tokens in such a way that all the amalgamations of secret word tokens
must form a triangle.
8. Stop.
Flowchart:
Star
Register a password.
n:=1 No Yes
Is n>4
n:=n+1
Is the nth
password blend No Login
forms triangle. attempt
failed.
Yes
Send one time password (OTP) for verification.
Is OTP is No
verified?
Yes
Login attempt is successful.
Stop
16 T. Srinivasa Ravi Kiran et al.
Step 1: For the first instance, the login entry is valid for the amalgamation “g5:g”
and for one time password “0783” (Fig. 2).
Step 2: One time password is not generated and the entry is foiled for sequence
“g5:g” at second entry as the client chooses wrong attempt (Fig. 3).
Step 3: For the second instance, the login entry is valid for the password blend “5:G5”
and for one time password “1508” (Fig. 4).
Step 4: For the third instance, the login entry is valid for the password blend “:Gg:”
and for one time password “4545” (Fig. 5).
Step 5: For the fourth instance, the login entry is valid for the password blend “Gg5G”
and for one time password “9412” (Fig. 6).
Step 6: If the first character is different from the terminal character, in such a case
the specific password amalgamation can be ignored (Fig. 7).
For example, if the user clicks on the buttons containing the letters “g5:G”, respec-
tively, the initial token “g” is not the same as the terminal token “G” and the pattern
triangle cannot be formed. In such a case the amalgamation is disregarded. Select
correct amalgamation of password blend in such a way that the triangle is formed.
Implementing Multilevel Graphical Password Authentication … 17
The results were confident and the client’s predictable triangles were formed by
clicking on the cells in an exact manner. It takes 37 ms to identify the required
triangle and to verify one time password as shown in the following four tables.
Peeping attacks were not possible with the proposed scheme since the client taps on
visible tokens are in random order (Tables 1, 2, 3, 4, 5, 6, 7 and 8).
Scheme
7 A Robust Y Y Y Y Y Y Y Y Y N N N
8 Multilevel Y Y Y Y Y Y Y Y Y Y Y Y
Y : Yes N : No
21
22 T. Srinivasa Ravi Kiran et al.
Table 7 A 12-point
S. no. Recognition schema Scale of efficiency
efficiency scale
1 Blonder 7
2 Jermyn 7
3 Stallings 8
4 Ziran Zheng 8
5 S3PAS 9
6 A Novel GP 9
7 A Robust 9
8 Multilevel 12
5 Comparative Analysis
The visual interface is a 10 × 10 grid where the user is educated to form a triangle with
password blends considered from the password chosen at the time of registration.
At the same time, the user is instructed to enter one time password on the interface
once the password blend is validated.
This type of multilevel evaluation is the first attempt in a password authentication
system. I have analyzed eight schemas of graphical password authentications. Among
all these schemas only four have a look at the approach of taking into consideration
the password blends from the original password. The schemas of the other authors
also did not tell the robustness of the original password and password blends.
In this proposed schema, the robustness of the password and password blends have
been correctly defined and fixed at 99.61% and 97.65%, respectively. The password
and password blends reduce the probability of cracking by the shoulder surfers since
he/she needs to validate every password blend with the onetime password (Figs. 8
and 9).
6 Conclusion
The existing scheme focused on the functioning of the user interface based on static
grids. It is possible to improve security by designing dynamic graphical grids. The
address space for passwords can be improved by increasing the grid size by rows as
well as columns.
Table 8 A comparative analysis of innovative graphical password schema
Row Proposed Is actual Is login phase Password Does the Does the Drawbacks Security Impervious to Average Robustness Robustness
schema password verified with space passwords password attacks security attacks login time in of the of each
protected? password permutations security pervious to milliseconds password password
permutations? forms is using i5 scheme permutation
triangle? verified processor
with one
time
password
1 Blonder N N N N N Password Spyware Brute force NS NS NS
space is Dictionary Shoulder surfing
small
Password Description Guessing
strength is
not
specified
2 Jermyn N N 4 × 4 grid N N Password Dictionary Shoulder surfing NS NS NS
space is Description
small
Password Spyware Guessing
strength is Brute force
Implementing Multilevel Graphical Password Authentication …
not
specified
3 Stallings N N NS N N Password NS Dictionary NS NS NS
strength is Spyware
not
specified
4 Ziran N N 5 × 5 grid N N Password NS Brute force NS NS NS
zheng robustness Dictionary
is not
specified Guessing
(continued)
23
Table 8 (continued)
24
Row Proposed Is actual Is login phase Password Does the Does the Drawbacks Security Impervious to Average Robustness Robustness
schema password verified with space passwords password attacks security attacks login time in of the of each
protected? password permutations security pervious to milliseconds password password
permutations? forms is using i5 scheme permutation
triangle? verified processor
with one
time
password
Password
strength is
not
specified
5 S3-pass Y Y 10 × 10 grid Y N Password NS Shoulder-surfing NS NS NS
strength is
not
specified
Lengthier Hidden-camera
login Spyware
processes
Hidden-camera
Spyware
6 A novel Y Y 10 × 10 grid Y N NS NS Shoulder-surfing 38.46 99.96% 99.23%
graphical Hidden-camera
password
scheme Random click
attacks
7 A robust Y Y 14 × 14 grid N N NS NS Shoulder-surfing 44 99.96% 99.23%
Hidden camera
Spyware
(continued)
T. Srinivasa Ravi Kiran et al.
Table 8 (continued)
Row Proposed Is actual Is login phase Password Does the Does the Drawbacks Security Impervious to Average Robustness Robustness
schema password verified with space passwords password attacks security attacks login time in of the of each
protected? password permutations security pervious to milliseconds password password
permutations? forms is using i5 scheme permutation
triangle? verified processor
with one
time
password
8 Multilevel Y Y 10 × 10 grid Y Y NS NS Brute force 37 99.61% 97.65%
Shoulder surfing
Guessing
Dictionary
Hidden camera
Spyware
NOTE: Y-Yes, N-No, NS-Not Specified
Implementing Multilevel Graphical Password Authentication …
25
Another random document with
no related content on Scribd:
Industrie
Parmi les poètes dont les œuvres peuvent entrer dans ce genre,
il faut citer: Kotlarevsky avec son Ode au Prince Kourakine;
Constantin Pouzyme (1790-1850) avec le Paysan petit russien;
Alexe Storojenko (1805-1874) avec son «Cygne» où il parle du
poète qui meurt fièrement sans attendre les applaudissements de la
foule; Samilenko, le traducteur de Molière; Hryntchenko, le
Déroulède ukrainien, etc.
Poésie satirique