Shruthi B S et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.4, April- 2023, pg. 42-46
© 2023, IJCSMC All Rights Reserved 42
Available Online at www.ijcsmc.com
International Journal of Computer Science and Mobile Computing
A Monthly Journal of Computer Science and Information Technology
ISSN 2320–088X
IMPACT FACTOR: 7.056
IJCSMC, Vol. 12, Issue. 4, April 2023, pg.42 – 46
USER AUTHENTICATION USING
EYE-BLINK PASSWORD
Shruthi B S; Manasa K B
Assistant Professors
Department of Information Science and Engineering
The National Institute of Engineering, Mysuru
Email Id: shruthinieit@gmail.com; mansi.harshi@gmail.com
DOI: https://doi.org/10.47760/ijcsmc.2023.v12i04.004
Abstract- Personal identification numbers (PINS) are used to authenticate a user for
security purpose. In order to authenticate himself the user should physically input the PIN,
which might be susceptible to password cracking via shoulder surfing or thermal tracking.
Authenticating a PIN with hands-off eye blinks PIN entry techniques, on the opposite
hand, offers a safer password entry option by not leaving any physical footprints behind.
User authentication using eye-blink password refers to finding the attention blinks in
sequential image frames, and generation of PIN. This paper presents an application with
three layer authentication system that are face detection, PIN entry by eye blink and OTP
(One Time Password) to avoid thermal tracking attacks and shoulder surfing.
Keywords: shoulder surfing, LBPH, Cascade classifiers
1. INTRODUCTION
One of the safety requirements for general terminal authentication systems is to be
easy, fast and secure as people face authentication mechanisms through password.
But, these techniques aren‟t safe because they're viewed by malicious observers who
use surveillance techniques like shoulder-surfing (observation user while typing the
password through the keyboard) to capture user authentication data. Also there are
security problems due to poor interactions between systems and users. As a result, the
researchers proposed eye tracking systems, where users can enter the password by
watching the acceptable symbols within the appropriate order and thus the user is
invulnerable to shoulder surfing. The aim of this paper is to review techniques to
handle eye movement tracking in security systems.