Abstract
Recognition-based image authentication (RbIA) has an advantage in terms of its memory retention of user credentials, which is one of the issues in knowledge-based user authentication (KUA). Therefore, RbIA is expected to serve as an alternative to conventional KUA. However, previous studies have reported that the security associated with RbIA schemes is comparable to that of four-digit personal identification number authentication. Therefore, the usage scene of RbIA schemes is considered to be limited. In this study, we propose two approaches for improving the security of an RbIA scheme without increasing the memory load of user credentials. We also conduct a user experiment to evaluate the login times of the proposed scheme for use in a mobile environment. The results reveal that the proposed scheme demonstrates potential in providing better security with a shorter login time than RbIA schemes proposed previously.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Suo, X., Zhu, Y., Own, G.: Graphical passwords: a survey. In: 21st Annual Computer Security Applications Conference (ACSAC’05), p. 10 (2005). https://doi.org/10.1109/CSAC.2005.27
Biddle, R., Chiasson, S., Van Oorschot, P.C.: Graphical passwords: learning from the first twelve years. ACM Comput. Surv. 44(4), 1–41 (2012). https://doi.org/10.1145/2333112.2333114
Paivio, A.: Mental imagery in associative learning and memory. Psychol. Rev. 76(3), 241–263 (1969). https://doi.org/10.1037/h0027272
Dhamija, R., Perrig, A.: Deja vu - a user study: using images for authentication. In: 9th USENIX Security Symposium (2000). https://www.usenix.org/conference/9th-usenix-security-symposium/deja-vu-user-study-using-images-authentication
Brostoff, S., Sasse, M.A.: Are passfaces more usable than passwords a field trial investigation. People and Computers XIV - Usability or Else (2000). https://doi.org/10.1007/978-1-4471-0515-2_27
Takada, T., Koike, H.: Awase-E: Image-based authentication for mobile phones using user’s favorite images. International Conference on Mobile Human-Computer Interaction (MobileHCI ’03), pp. 347–351, (2003). https://doi.org/10.1007/978-3-540-45233-1_26
Angeli, A.D., Coventry, L., Johnson, G., Renaud, K.: Is a picture really worth a thousand words? exploring feasibility graphical authentication System. Int. J. Hum. Comput. Stud. 63(1–2), 128–152 (2005). https://doi.org/10.1016/j.ijhcs.2005.04.020
Pering, T., Sundar, M., Light, J., Want, R.: Photographic authentication through untrusted terminals. IEE Pervasive Comput. 2(1), 30–36 (2003). https://doi.org/10.1109/MPRV.2003.1186723
Hayashi, E., Dhamija, R., Christin, N., Perrig, A.: Use your illusion: secure authentication usable anywhere, 4th Symposium on Usable Privacy and Security (SOUPS ’08), pp. 35–45 (2008). https://doi.org/10.1145/1408664.1408670
Davis, D., Monrose, F., Reiter, M.K.: On user choice in graphical password schemes. In: 13th USENIX Security Symposium, p. 13 (2004). https://www.usenix.org/conference/13th-usenix-security-symposium/user-choice-graphical-password-schemes
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Takada, T., Schwarz, D. (2022). Design Exploration for Better Security of Recognition-Based Image Authentication in Mobile Environment. In: Delir Haghighi, P., Khalil, I., Kotsis, G. (eds) Advances in Mobile Computing and Multimedia Intelligence. MoMM 2022. Lecture Notes in Computer Science, vol 13634. Springer, Cham. https://doi.org/10.1007/978-3-031-20436-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-031-20436-4_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-20435-7
Online ISBN: 978-3-031-20436-4
eBook Packages: Computer ScienceComputer Science (R0)