UPSI Digital Repository (UDRep)
Start | FAQ | About
Menu Icon

QR Code Link :

Type :article
Subject :QA75 Electronic computers. Computer science
ISSN :1847-6996
Main Author :Mohd Afizi Mohd Shukran
Additional Authors :Mohd Sidek Fadhil Mohd Yunus
Title :Pixel value graphical password scheme: k-means as graphical password fault tolerance
Place of Production :Tanjung Malim
Publisher :Fakulti Seni, Komputeran Dan Industri Kreatif
Year of Publication :2021
Notes :International Journal of Electrical and Computer Engineering Systems
Corporate Name :Universiti Pendidikan Sultan Idris
HTTP Link :Click to view web link

Abstract : Universiti Pendidikan Sultan Idris
Pixel value access control (PVAC) was introduced to deliver a secure and simple graphical password method where it requires users to load their image as their password. PVAC extracts the image to obtain a three-octet 8-bits Red-Green-Blue (RGB) value as its password to authenticate a user. The pixel value must be matched with the record stored in the database or otherwise, the user is failed to authenticate. However, users which prefer to store images on cloud storage would unintentionally alter and as well as the pixel value due to media compression and caused faulty pixels. Thus, the K-Means clustering algorithm is adapted to fix the issue where the faulty pixel value would be recognized as having the same pixel value cluster as the original. However, most of K-Means algorithm works were mainly developed for content-based image retrieval (CBIR) which having opposite characteristics from PVAC. Thus, this study was aimed to investigate the crucial criteria of PVAC and its compatibility with the K-Means algorithm for the problem. The theoretical analysis is used for this study where the suitable characteristics of K-Means are analyze based on PVAC requirements. The compliance analysis might become a referencing work for digital image clustering techniques adaptation on security system such as image filtering, image recognition, and object detection since most of image clustering works was focused on less sensitive image retrieval. ? 2021 J.J. Strossmayer University of Osijek , Faculty of Electrical Engineering, Computer Science and Information Technology. All rights reserved.

References

Azam, M., & Bouguila, N. (2019). Bounded laplace mixture model with applications to image clustering and content based image retrieval. Paper presented at the Proceedings - 17th IEEE International Conference on Machine Learning and Applications, ICMLA 2018, 558-563. doi:10.1109/ICMLA.2018.00090 Retrieved from www.scopus.com

Irfan, S., Dwivedi, G., & Ghosh, S. (2018). Optimization of K-means clustering using genetic algorithm. Paper presented at the 2017 International Conference on Computing and Communication Technologies for Smart Nation, IC3TSN 2017, , 2017-October 156-161. doi:10.1109/IC3TSN.2017.8284468 Retrieved from www.scopus.com

Kamper, H., Anastassiou, A., & Livescu, K. (2019). Semantic query-by-example speech search using visual grounding. Paper presented at the ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, , 2019-May 7120-7124. doi:10.1109/ICASSP.2019.8683275 Retrieved from www.scopus.com

Kumari, R., Sheetanshu, Singh, M. K., Jha, R., & Singh, N. K. (2016). Anomaly detection in network traffic using K-mean clustering. Paper presented at the 2016 3rd International Conference on Recent Advances in Information Technology, RAIT 2016, 387-393. doi:10.1109/RAIT.2016.7507933 Retrieved from www.scopus.com

Li, C., Bai, J., Yi, C., & Luo, Y. (2019). Resource and replica management strategy for optimizing financial cost and user experience in edge cloud computing system. Inform.Sci., Retrieved from www.scopus.com

MacQueen, J. (1967). Some methods for classification and analysis of multivariate observations. Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, 1, 281-297. Retrieved from www.scopus.com

Nayini, S. E. Y., Geravand, S., & Maroosi, A. (2018). A novel threshold-based clustering method to solve K-means weaknesses. Paper presented at the 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing, ICECDS 2017, 47-52. doi:10.1109/ICECDS.2017.8389496 Retrieved from www.scopus.com

Sammut, C., & Webb, G. I. (2017). Online controlled experiments and a/b testing. Encyclopedia of Machine Learning and Data Mining, , 922-929. Retrieved from www.scopus.com

Shukran, M. A. M., Ahmad, N. S. M., Ramli, S., & Rahmat, F. (2019). Melanoma cancer diagnosis device using image processing techniques. International Journal of Recent Technology and Engineering, 7(5), 490-494. Retrieved from www.scopus.com

Shukran, M. A. M., & Yunus, M. S. F. M. (2018). Method and System for Authenticating User using Graphical Password for Access Control, Retrieved from www.scopus.com

Shukran, M. A. M., & Yunus, M. S. F. M. (2018). Pixel value graphical password scheme: Fake passpix attempt on hexadecimal password style. International Journal of Information and Communication Sciences, 3(3), 104. Retrieved from www.scopus.com

Shukran, M. A. M., Yunus, M. S. F. M., Abdullah, M. N., Ismail, M. N., & Isa, M. R. M. (2019). Pixel value graphical password: A passpix clustering technique for password fault tolerance. International Journal of Recent Technology and Engineering, 8(3), 2973-2976. doi:10.35940/ijrte.C4817.098319

Slamet, C., Rahman, A., Ramdhani, M. A., & Dharmalaksana, W. (2016). Clustering the verses of the holy qur'an using K-means algorithm. Asian Journal of Information Technology, 15(24), 5159-5162. Retrieved from www.scopus.com

Widjaja, A. E., Chen, J. V., Sukoco, B. M., & Ha, Q. -. (2019). Understanding users’ willingness to put their personal information on the personal cloud-based storage applications: An empirical study. Computers in Human Behavior, 91, 167-185. doi:10.1016/j.chb.2018.09.034

Wu, K., Vassileva, J., & Zhao, Y. (2017). Understanding users' intention to switch personal cloud storage services: Evidence from the chinese market. Computers in Human Behavior, 68, 300-314. doi:10.1016/j.chb.2016.11.039

Yunus, M. S. F. M. (2020). A Novel Graphical Password Clustering Method for Fault Tolerance Mechanism, Retrieved from www.scopus.com

Yunus, M. S. F. M., Shukran, M. A. M., & Abdullah, M. N. (2019). Pixel-Based Graphical Password Scheme: Password from Digital Image File, Retrieved from www.scopus.com

Zloof, M. M. (1975). QUERY BY EXAMPLE. AFIPS Natl Comput Conf Expo Conf Proc, 44, 431-438. Retrieved from www.scopus.com


This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials.
You may use the digitized material for private study, scholarship, or research.

Back to previous page

Installed and configured by Bahagian Automasi, Perpustakaan Tuanku Bainun, Universiti Pendidikan Sultan Idris
If you have enquiries, kindly contact us at pustakasys@upsi.edu.my or 016-3630263. Office hours only.