Abstract
Online banking administrators usually try to use sufficiently strong security solutions to encourage individuals to use online banks. They provide virtual keyboards for users to log in with as a main security solution to facilitate their users’ trust in their security solutions. The virtual keyboards can be prone to screenshot capture by various means, such as Trojans, malware, and shoulder surfing attacks. Different proposals for virtual keyboards have been presented by many authors with different means of input. In this paper, we provide a cloaking virtual keyboard (CVK) as a model for a virtual keyboard with cloaked input. The proposed model goes beyond using a virtual keyboard to prevent a screenshot attack on the online banking application system. It provides a means to inform the administrators of the new attack and takes the attacker to a false account.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Agarwal, M., Mehara, M., Pawar, R., Shah, D.: Secure authentication using dynamic virtual keyboard layout. In: Proceedings of the International Conference and Workshop on Emerging Trends in Technology, ISSN 2349–516, vol. 2, February 2011
Echallier, N., Grimaud, G., et al.: Virtual keyboard logging counter-measures using common fate’s law. In: International Conference on Security and Management (SAM 2017), Las Vegas, USA, 17–20 July 2017
Gong, S., Lin, J., Sun, Y.: Design and implementation of anti-screenshot virtual keyboard applied in online banking. In: 2010 International Conference on E-Business and E-Government, pp. 1320–1322. IEEE, 2010
Nayak, C., Parhi, M., Ghosal, S.: Robust virtual keyboard for online banking. Int. J. Comput. Appl. 107(21) (2014)
Bacara, C., et al.: Virtual keyboard logging counter-measures using human vision properties. In: 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (2015)
Peris-Lopez, P., Martín, H.: Hardware Trojans against virtual keyboards on e-banking platforms–A proof of concept. AEU-Int. J. Electron. Commun. 76, 146–151 (2017)
Choudhury, B., Reddy, P.V., Jha, R.M.: Permittivity and permeability tensors for cloaking applications. In: Permittivity and Permeability Tensors for Cloaking Applications, pp. 1–43. Springer, Singapore (2016)
D’Angelo, G., Vitali, F., Zacchiroli, S.: Content cloaking: preserving privacy with Google Docs and other web applications. In: Proceedings of the 2010 ACM symposium on applied computing, pp. 826–830. ACM, March 2010
Duan, R., Wang, W., Lee, W.: Cloaker catcher: a client-based cloaking detection system. arXiv preprint arXiv:1710.01387 (2017)
Cecotti, H.: A multimodal gaze-controlled virtual keyboard. IEEE Trans. Hum.-Mach. Syst. 46(4), 601–606 (2016)
Yang, S.W., Lin, C.S., Lin, S.K., Lee, C.H.: Design of virtual keyboard using blink control method for the severely disabled. Comput. Methods Programs Biomed. 111(2), 410–418 (2013)
Zhang, X., Liu, X., Yuan, S.M., Lin, S.F.: Eye tracking based control system for natural human-computer interaction. Computational Intelligence and Neuroscience (2017)
Mohsin, H., Hameedi, S.A.: Pupil detection algorithm based on feature extraction for eye gaze. In: Information and Communication Technology and Accessibility (ICTA), 2017 6th International Conference on, pp. 1–4. IEEE, 2017
Acknowledgements
We are thankful to the anonymous reviewers for their great efforts to improve this work quality with their valuable suggestions and comments.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Mohsin, H., Bahjat, H. (2020). Anti-screenshot Keyboard for Web-Based Application Using Cloaking. In: Bouhlel, M., Rovetta, S. (eds) Proceedings of the 8th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT’18), Vol.1. SETIT 2018. Smart Innovation, Systems and Technologies, vol 146. Springer, Cham. https://doi.org/10.1007/978-3-030-21005-2_45
Download citation
DOI: https://doi.org/10.1007/978-3-030-21005-2_45
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-21004-5
Online ISBN: 978-3-030-21005-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)