Browse > Article
http://dx.doi.org/10.15207/JKCS.2018.9.9.015

User Authentication System using OCR  

Jeong, Pil-Seong (Dept. of Information Technology Communication, Myongji College)
Cho, Yang-Hyun (Division of Computer & Mechatronics Engineering, Sahmyook University)
Publication Information
Journal of the Korea Convergence Society / v.9, no.9, 2018 , pp. 15-22 More about this Journal
Abstract
As smart devices become popular, users can use authentication services in various methods. Authentication services include authentication using an ID and a password, authentication using a sms, and authentication using an OTP(One Time Password). This paper proposed an authentication system that solves the security problem of knowledge-based authentication using optical character recognition and can easily and quickly authenticate users. The proposed authentication system extracts a character from an uploaded image by a user and authenticates the user using the extracted character information. The proposed authentication system has the advantage of not using a password or an OTP that are easily exposed or lost, and can not be authenticated without using accurate photographs. The proposed authentication system is platform independent and can be used for user authentication, file encryption and decryption.
Keywords
Optical Character Recognition; User Authentication; Authentication System; Personal Information; Information Security;
Citations & Related Records
Times Cited By KSCI : 9  (Citation Analysis)
연도 인용수 순위
1 T. H. Park, G. R. Lee & H. W. Kim. (2017). Survey and Prospective on Privacy Protection Methods on Cloud Platform Environment, Journal of the Korea Institute of Information Security & Cryptology, 27(5), 1149-1155. DOI : 10.13089/JKIISC.2017.27.5.1149   DOI
2 Y. Ko, J. Choi & B. Kim. (2012). Protecting Individuals from Secondary Privacy Loss using Breached Personal Data Information Center, Journal of the Korea Institute of Information Security & Cryptology, 22(2), 391-400.
3 T. Y. Kim, H. J. Jun & T. S. Kim. (2018). An Analysis on Intention to Use Information Service for Personal Information Breach, Journal of the Korea Institute of Information Security & Cryptology, 28(1), 199-213.   DOI
4 H. J. Mum, (2018). Biometric Information and OTP based on Authentication Mechanism using Blockchain, Journal of Convergence for Information Technology, 8(3), 85-90.   DOI
5 S. H. Lee, (2014). User Authentication Using Biometrics and OTP in Mobile Device, Journal of Convergence for Information Technology, 4(3), 27-31.
6 S. S. Ji, (2012). The Improved-Scheme of Two Factor Authentication using SMS, Journal of the Korea Industrial Information Systems Research, 17(6), 25-30. DOI : 10.9723/jksiis.2012.17.6.025   DOI
7 Google. (2018). Google Cloud Vision API. Google Cloud Vision(Online). https://cloud.google.com/vision
8 S. J. Kim & S. S. Yeo, (2013). A Study on Secure Data Access Control in Mobile Cloud Environment, Journal of Digital Convergence, 11(2), 317-322.   DOI
9 H. T. Chae & S. J. Lee, (2014). Security Policy Proposals through PC Security Solution Log Analysis - Prevention Leakage of Personal Information, Journal of the Korea Institute of Information Security & Cryptology, 24(5), 961-968. DOI : 10.13089/JKIISC.2014.24.5.961   DOI
10 S. Khandelwal. (2016). QRLJacking - Hacking Technique to Hijack QR Code Based Quick Login System. The Hacker New(Online). https://thehackernews.com/2016/07/qrljacking-hackingqr-code.html
11 Y. J. Shin, S. H. Shin, J. S. Lee & W. G. Han, (2015). A Study on Improvement of Identification Means in R.O.K, Journal of Korean Associastion for Regional Information Society, 18(4), 59-88.
12 D. J. Kim & H. S. Choi, (2009). Design on Protection and Authentication System of IPTV Contents using OTP, Journal of The Korea Ccontens Association, 9(8), 129-137. DOI : 10.5392/JKCA.2009.9.8.129   DOI
13 H. Ketabdar, K. A. Yuksel, A. Jahnbekarn, M. Roshandel & D. Skirop, (2010). MagiSign: User Identification /Authentication Based on 3D Around Device Magnetic Signatures, Proc. Of UBICOMM'10, 31-34.
14 C. J. Chae, H. J. Cho & H. M. Jung, (2018). Authentication Method using Multiple Biometric Information in FIDO Environment, Journal of Digital Convergence, 16(1), 159-164.   DOI
15 J. S. Seo & J. S. Moon, (2015). A Study on User Authentication with Smartphone Accelerometer Sensor, Journal of The Korea Institute of Information Security and Cryptology, 25(6), 1477-1484. DOI : 10.13089/JKIISC.2015.25.6.1477   DOI