Watermark blending technique for securing user authentication data in mobile application systems

Watermark is traditionally used for protecting copyrighted materials such as scripts, movies, images or sounds. Nowadays, the watermark is still widely used but more in a digitized environment. There are many ways of how the watermarks are being applied. In this paper, the watermark is not applied f...

Full description

Bibliographic Details
Main Authors: Mohamed, Kartini, Sidi, Fatimah, A. Jabar, Marzanah, Ishak, Iskandar
Format: Conference or Workshop Item
Language:English
Published: Database Technologies and Applications Research Group (DbTA), Faculty of Computer Science and Information Technology, Universiti Putra Malaysia 2019
Online Access:http://psasir.upm.edu.my/id/eprint/75527/
http://psasir.upm.edu.my/id/eprint/75527/1/ISICTMA2019-15.pdf
_version_ 1848857713203740672
author Mohamed, Kartini
Sidi, Fatimah
A. Jabar, Marzanah
Ishak, Iskandar
author_facet Mohamed, Kartini
Sidi, Fatimah
A. Jabar, Marzanah
Ishak, Iskandar
author_sort Mohamed, Kartini
building UPM Institutional Repository
collection Online Access
description Watermark is traditionally used for protecting copyrighted materials such as scripts, movies, images or sounds. Nowadays, the watermark is still widely used but more in a digitized environment. There are many ways of how the watermarks are being applied. In this paper, the watermark is not applied for the purpose of protecting copyrighted materials but more on digitally securing user authentication data used for accessing mobile application systems (mobile apps). A user authentication model is developed to improve the access control to mobile apps. The model introduces three protection techniques namely multi-factoring, ciphering and watermarking techniques. In multi-factoring technique, the number of user authentication factors is increased from having just username and password to raise the difficulty of guessing the authenticating data. The added factors are mobile IMEI number, mobile SIM card number, random number and time. In ciphering technique, the user authentication factors are not only encrypted but also hashed to ensure the encrypted data cannot be easily decrypted. Finally, in the watermarking technique, the authenticating data are concealed by blending them in such a way that they cannot be un-blended without knowing the blending formula. Although there are three protection techniques introduced, only watermarking technique is described in more details in this paper. The effectiveness of the introduced techniques is measured based on user acceptance level using a statistical analysis. The analysis shows that although ciphering technique is the highest contributor among other techniques, watermarking technique not only has the strongest relationship but also becomes the dominant factor in making them acceptable by users of mobile apps.
first_indexed 2025-11-15T12:01:55Z
format Conference or Workshop Item
id upm-75527
institution Universiti Putra Malaysia
institution_category Local University
language English
last_indexed 2025-11-15T12:01:55Z
publishDate 2019
publisher Database Technologies and Applications Research Group (DbTA), Faculty of Computer Science and Information Technology, Universiti Putra Malaysia
recordtype eprints
repository_type Digital Repository
spelling upm-755272019-10-07T07:42:04Z http://psasir.upm.edu.my/id/eprint/75527/ Watermark blending technique for securing user authentication data in mobile application systems Mohamed, Kartini Sidi, Fatimah A. Jabar, Marzanah Ishak, Iskandar Watermark is traditionally used for protecting copyrighted materials such as scripts, movies, images or sounds. Nowadays, the watermark is still widely used but more in a digitized environment. There are many ways of how the watermarks are being applied. In this paper, the watermark is not applied for the purpose of protecting copyrighted materials but more on digitally securing user authentication data used for accessing mobile application systems (mobile apps). A user authentication model is developed to improve the access control to mobile apps. The model introduces three protection techniques namely multi-factoring, ciphering and watermarking techniques. In multi-factoring technique, the number of user authentication factors is increased from having just username and password to raise the difficulty of guessing the authenticating data. The added factors are mobile IMEI number, mobile SIM card number, random number and time. In ciphering technique, the user authentication factors are not only encrypted but also hashed to ensure the encrypted data cannot be easily decrypted. Finally, in the watermarking technique, the authenticating data are concealed by blending them in such a way that they cannot be un-blended without knowing the blending formula. Although there are three protection techniques introduced, only watermarking technique is described in more details in this paper. The effectiveness of the introduced techniques is measured based on user acceptance level using a statistical analysis. The analysis shows that although ciphering technique is the highest contributor among other techniques, watermarking technique not only has the strongest relationship but also becomes the dominant factor in making them acceptable by users of mobile apps. Database Technologies and Applications Research Group (DbTA), Faculty of Computer Science and Information Technology, Universiti Putra Malaysia 2019 Conference or Workshop Item PeerReviewed text en http://psasir.upm.edu.my/id/eprint/75527/1/ISICTMA2019-15.pdf Mohamed, Kartini and Sidi, Fatimah and A. Jabar, Marzanah and Ishak, Iskandar (2019) Watermark blending technique for securing user authentication data in mobile application systems. In: International Symposium on ICT Management and Administration (ISICTMA2019), 31 July-2 Aug. 2019, Putrajaya Marriott Hotel, Malaysia. (pp. 74-78).
spellingShingle Mohamed, Kartini
Sidi, Fatimah
A. Jabar, Marzanah
Ishak, Iskandar
Watermark blending technique for securing user authentication data in mobile application systems
title Watermark blending technique for securing user authentication data in mobile application systems
title_full Watermark blending technique for securing user authentication data in mobile application systems
title_fullStr Watermark blending technique for securing user authentication data in mobile application systems
title_full_unstemmed Watermark blending technique for securing user authentication data in mobile application systems
title_short Watermark blending technique for securing user authentication data in mobile application systems
title_sort watermark blending technique for securing user authentication data in mobile application systems
url http://psasir.upm.edu.my/id/eprint/75527/
http://psasir.upm.edu.my/id/eprint/75527/1/ISICTMA2019-15.pdf