Skip to main content

Anti-screenshot Keyboard for Web-Based Application Using Cloaking

  • Conference paper
  • First Online:

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 146))

Abstract

Online banking administrators usually try to use sufficiently strong security solutions to encourage individuals to use online banks. They provide virtual keyboards for users to log in with as a main security solution to facilitate their users’ trust in their security solutions. The virtual keyboards can be prone to screenshot capture by various means, such as Trojans, malware, and shoulder surfing attacks. Different proposals for virtual keyboards have been presented by many authors with different means of input. In this paper, we provide a cloaking virtual keyboard (CVK) as a model for a virtual keyboard with cloaked input. The proposed model goes beyond using a virtual keyboard to prevent a screenshot attack on the online banking application system. It provides a means to inform the administrators of the new attack and takes the attacker to a false account.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Agarwal, M., Mehara, M., Pawar, R., Shah, D.: Secure authentication using dynamic virtual keyboard layout. In: Proceedings of the International Conference and Workshop on Emerging Trends in Technology, ISSN 2349–516, vol. 2, February 2011

    Google Scholar 

  2. Echallier, N., Grimaud, G., et al.: Virtual keyboard logging counter-measures using common fate’s law. In: International Conference on Security and Management (SAM 2017), Las Vegas, USA, 17–20 July 2017

    Google Scholar 

  3. Gong, S., Lin, J., Sun, Y.: Design and implementation of anti-screenshot virtual keyboard applied in online banking. In: 2010 International Conference on E-Business and E-Government, pp. 1320–1322. IEEE, 2010

    Google Scholar 

  4. Nayak, C., Parhi, M., Ghosal, S.: Robust virtual keyboard for online banking. Int. J. Comput. Appl. 107(21) (2014)

    Article  Google Scholar 

  5. Bacara, C., et al.: Virtual keyboard logging counter-measures using human vision properties. In: 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (2015)

    Google Scholar 

  6. Peris-Lopez, P., Martín, H.: Hardware Trojans against virtual keyboards on e-banking platforms–A proof of concept. AEU-Int. J. Electron. Commun. 76, 146–151 (2017)

    Article  Google Scholar 

  7. Choudhury, B., Reddy, P.V., Jha, R.M.: Permittivity and permeability tensors for cloaking applications. In: Permittivity and Permeability Tensors for Cloaking Applications, pp. 1–43. Springer, Singapore (2016)

    Google Scholar 

  8. D’Angelo, G., Vitali, F., Zacchiroli, S.: Content cloaking: preserving privacy with Google Docs and other web applications. In: Proceedings of the 2010 ACM symposium on applied computing, pp. 826–830. ACM, March 2010

    Google Scholar 

  9. Duan, R., Wang, W., Lee, W.: Cloaker catcher: a client-based cloaking detection system. arXiv preprint arXiv:1710.01387 (2017)

  10. Cecotti, H.: A multimodal gaze-controlled virtual keyboard. IEEE Trans. Hum.-Mach. Syst. 46(4), 601–606 (2016)

    Article  Google Scholar 

  11. Yang, S.W., Lin, C.S., Lin, S.K., Lee, C.H.: Design of virtual keyboard using blink control method for the severely disabled. Comput. Methods Programs Biomed. 111(2), 410–418 (2013)

    Article  Google Scholar 

  12. Zhang, X., Liu, X., Yuan, S.M., Lin, S.F.: Eye tracking based control system for natural human-computer interaction. Computational Intelligence and Neuroscience (2017)

    Google Scholar 

  13. Mohsin, H., Hameedi, S.A.: Pupil detection algorithm based on feature extraction for eye gaze. In: Information and Communication Technology and Accessibility (ICTA), 2017 6th International Conference on, pp. 1–4. IEEE, 2017

    Google Scholar 

Download references

Acknowledgements

We are thankful to the anonymous reviewers for their great efforts to improve this work quality with their valuable suggestions and comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hanaa Mohsin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mohsin, H., Bahjat, H. (2020). Anti-screenshot Keyboard for Web-Based Application Using Cloaking. In: Bouhlel, M., Rovetta, S. (eds) Proceedings of the 8th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT’18), Vol.1. SETIT 2018. Smart Innovation, Systems and Technologies, vol 146. Springer, Cham. https://doi.org/10.1007/978-3-030-21005-2_45

Download citation

Publish with us

Policies and ethics