UPM Institutional Repository

Watermark blending technique for securing user authentication data in mobile application systems


Citation

Mohamed, Kartini and Sidi, Fatimah and A. Jabar, Marzanah and Ishak, Iskandar (2019) Watermark blending technique for securing user authentication data in mobile application systems. In: International Symposium on ICT Management and Administration (ISICTMA2019), 31 July-2 Aug. 2019, Putrajaya Marriott Hotel, Malaysia. (pp. 74-78).

Abstract

Watermark is traditionally used for protecting copyrighted materials such as scripts, movies, images or sounds. Nowadays, the watermark is still widely used but more in a digitized environment. There are many ways of how the watermarks are being applied. In this paper, the watermark is not applied for the purpose of protecting copyrighted materials but more on digitally securing user authentication data used for accessing mobile application systems (mobile apps). A user authentication model is developed to improve the access control to mobile apps. The model introduces three protection techniques namely multi-factoring, ciphering and watermarking techniques. In multi-factoring technique, the number of user authentication factors is increased from having just username and password to raise the difficulty of guessing the authenticating data. The added factors are mobile IMEI number, mobile SIM card number, random number and time. In ciphering technique, the user authentication factors are not only encrypted but also hashed to ensure the encrypted data cannot be easily decrypted. Finally, in the watermarking technique, the authenticating data are concealed by blending them in such a way that they cannot be un-blended without knowing the blending formula. Although there are three protection techniques introduced, only watermarking technique is described in more details in this paper. The effectiveness of the introduced techniques is measured based on user acceptance level using a statistical analysis. The analysis shows that although ciphering technique is the highest contributor among other techniques, watermarking technique not only has the strongest relationship but also becomes the dominant factor in making them acceptable by users of mobile apps.


Download File

[img] Text
ISICTMA2019-15.pdf
Restricted to Repository staff only

Download (334kB)

Additional Metadata

Item Type: Conference or Workshop Item (Paper)
Divisions: Faculty of Computer Science and Information Technology
Publisher: Database Technologies and Applications Research Group (DbTA), Faculty of Computer Science and Information Technology, Universiti Putra Malaysia
Keywords: Watermark; Mobile application system; Security; User authentication; Data transmission
Depositing User: Nabilah Mustapa
Date Deposited: 07 Oct 2019 07:42
Last Modified: 07 Oct 2019 07:42
URI: http://psasir.upm.edu.my/id/eprint/75527
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item