Skip to main content

Design Exploration for Better Security of Recognition-Based Image Authentication in Mobile Environment

  • Conference paper
  • First Online:
Advances in Mobile Computing and Multimedia Intelligence (MoMM 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13634))

  • 296 Accesses

Abstract

Recognition-based image authentication (RbIA) has an advantage in terms of its memory retention of user credentials, which is one of the issues in knowledge-based user authentication (KUA). Therefore, RbIA is expected to serve as an alternative to conventional KUA. However, previous studies have reported that the security associated with RbIA schemes is comparable to that of four-digit personal identification number authentication. Therefore, the usage scene of RbIA schemes is considered to be limited. In this study, we propose two approaches for improving the security of an RbIA scheme without increasing the memory load of user credentials. We also conduct a user experiment to evaluate the login times of the proposed scheme for use in a mobile environment. The results reveal that the proposed scheme demonstrates potential in providing better security with a shorter login time than RbIA schemes proposed previously.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Suo, X., Zhu, Y., Own, G.: Graphical passwords: a survey. In: 21st Annual Computer Security Applications Conference (ACSAC’05), p. 10 (2005). https://doi.org/10.1109/CSAC.2005.27

  2. Biddle, R., Chiasson, S., Van Oorschot, P.C.: Graphical passwords: learning from the first twelve years. ACM Comput. Surv. 44(4), 1–41 (2012). https://doi.org/10.1145/2333112.2333114

  3. Paivio, A.: Mental imagery in associative learning and memory. Psychol. Rev. 76(3), 241–263 (1969). https://doi.org/10.1037/h0027272

    Article  Google Scholar 

  4. Dhamija, R., Perrig, A.: Deja vu - a user study: using images for authentication. In: 9th USENIX Security Symposium (2000). https://www.usenix.org/conference/9th-usenix-security-symposium/deja-vu-user-study-using-images-authentication

  5. Brostoff, S., Sasse, M.A.: Are passfaces more usable than passwords a field trial investigation. People and Computers XIV - Usability or Else (2000). https://doi.org/10.1007/978-1-4471-0515-2_27

  6. Takada, T., Koike, H.: Awase-E: Image-based authentication for mobile phones using user’s favorite images. International Conference on Mobile Human-Computer Interaction (MobileHCI ’03), pp. 347–351, (2003). https://doi.org/10.1007/978-3-540-45233-1_26

  7. Angeli, A.D., Coventry, L., Johnson, G., Renaud, K.: Is a picture really worth a thousand words? exploring feasibility graphical authentication System. Int. J. Hum. Comput. Stud. 63(1–2), 128–152 (2005). https://doi.org/10.1016/j.ijhcs.2005.04.020

    Article  Google Scholar 

  8. Pering, T., Sundar, M., Light, J., Want, R.: Photographic authentication through untrusted terminals. IEE Pervasive Comput. 2(1), 30–36 (2003). https://doi.org/10.1109/MPRV.2003.1186723

    Article  Google Scholar 

  9. Hayashi, E., Dhamija, R., Christin, N., Perrig, A.: Use your illusion: secure authentication usable anywhere, 4th Symposium on Usable Privacy and Security (SOUPS ’08), pp. 35–45 (2008). https://doi.org/10.1145/1408664.1408670

  10. Davis, D., Monrose, F., Reiter, M.K.: On user choice in graphical password schemes. In: 13th USENIX Security Symposium, p. 13 (2004). https://www.usenix.org/conference/13th-usenix-security-symposium/user-choice-graphical-password-schemes

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tetsuji Takada .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Takada, T., Schwarz, D. (2022). Design Exploration for Better Security of Recognition-Based Image Authentication in Mobile Environment. In: Delir Haghighi, P., Khalil, I., Kotsis, G. (eds) Advances in Mobile Computing and Multimedia Intelligence. MoMM 2022. Lecture Notes in Computer Science, vol 13634. Springer, Cham. https://doi.org/10.1007/978-3-031-20436-4_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-20436-4_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-20435-7

  • Online ISBN: 978-3-031-20436-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics