Skip to main content

Awase-E: Image-Based Authentication for Mobile Phones Using User’s Favorite Images

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2795))

Abstract

There is a trade-off between security and usability in user authentication for mobile phones. Since such devices have a poor input interfaces, 4-digit number passwords are widely used at present. Therefore, a more secure and user friendly authentication is needed. This paper proposes a novel authentication method called “Awase-E”. The system uses image passwords. It, moreover, integrates image registration and notification interfaces. Image registration enables users to use their favorite image instead of a text password. Notification gives users a trigger to take action against a threat when it happens. Awase-E is implemented so that it has a higher usability even when it is used through a mobile phone.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dhamija, R., Perrig, A.: Deja Vu: A User Study Using Images for Authentication. In: 9 th Usenix Security Symposium, August 2000, pp. 45–58 (2000)

    Google Scholar 

  2. Angeli, A.D., Coutts, M., Coventry, L., Johnson, G.I.: VIP: a visual approach to user authentication. In: Proc. of the Working Conference on Advanced Visual Interface (AVI 2002), May 2002, pp. 316–323 (2002)

    Google Scholar 

  3. Perrig, A., Song, D.: Hash Visualization: a New Technique to improve Real- World Security. In: International Workshop on Cryptographic Techniques and ECommerce, CrypTEC (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Takada, T., Koike, H. (2003). Awase-E: Image-Based Authentication for Mobile Phones Using User’s Favorite Images. In: Chittaro, L. (eds) Human-Computer Interaction with Mobile Devices and Services. Mobile HCI 2003. Lecture Notes in Computer Science, vol 2795. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45233-1_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-45233-1_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40821-5

  • Online ISBN: 978-3-540-45233-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics