Multimedia Tools and Applications

, Volume 78, Issue 5, pp 5287–5303 | Cite as

Multimedia image data processing on smartphone for authentication

  • Seon-Joo Kim
  • Jin-Mook KimEmail author
  • In-June Jo


The spread of smartphones is rapidly increasing. Such smartphones mainly handle image and video data. In particular, there are many security problems that may occur at this time when there are many accesses to multimedia image data. But most systems use various technologies for user authentication such as identification/password (ID/PW), the certificate, One-Time Password (OTP), fingerprint/iris recognition, etc. When using ID/PW technology, the system is vulnerable, if ID/PW is disclosed to a hacker. The certificate or fingerprint/iris recognition technologies are more secure than ID/PW technology, but they require more cost, and they are complex to build. In this paper, we propose the method for enhancing user authentication. The proposed method improves security at a low cost using the user’s authentication information and the user’s smartphone IMEI information. In particular, IMEI information can be seen to provide a fast right and secure authentication mechanism to perform user authentication of multimedia image processing. In our research method, it is much safer and superior responsiveness than authentication methods using only user ID / Password on smartphones.


User authentication Smartphone authentication information IMEI Multimedia image data processing 


  1. 1.
    (2015) The advantages and disadvantages of biometric technologies, and privacy. IDG KoreaGoogle Scholar
  2. 2.
    Cho S, Choi D-S, Jin S, Lee H(2014) Passwordless authentication technology- FIDO. ETRI, A Special issue of Software Technology Trends. (102)Google Scholar
  3. 3.
  4. 4.
    Haller N, Metz C, Nesser P, Straw M (1998) A one-time password system. RFC 2289, IETFGoogle Scholar
  5. 5.
    Kim Y, Na J, Sohn S (2001) Trends on password-based authentication protocols. ETRI, Electronics and Telecommunications Trends, vol 16, no 6. (12)Google Scholar
  6. 6.
    Kim S-Y, Kim S-J, Joe I-J (2014) Enhanced password based user authentication mechanism using mobile storage medium/channel. The Journal of the Korea Contents Society(KOCON.a) ‘04 vol 4, no 4’. (533)Google Scholar
  7. 7.
    KISA (2011) Research on security criteria for extension to electronic authentication method usage-basedGoogle Scholar
  8. 8.
    KISA (2015) A report of mobile internet use survey 2015Google Scholar
  9. 9.
    KT DIGIECO Report (2015) 2015 mobile trendsGoogle Scholar
  10. 10.
    Lee S-M (2012) Current trends in authentication technology. Korea IT Service Industry Association (ITSA), (33)Google Scholar
  11. 11.
    Lee JH (2013) The utilization and problems of digital certificates in a smart environment. Report of Korea Internet & Security Agency(KISA), Internet & Security FocusGoogle Scholar
  12. 12.
    Ministry of the interior report. Resident demographics.
  13. 13.
    Na S, Shin S, Kwon T (2011) Trends in user authentication of smartphones managing and using their saved mobile IDs. Review of the Korea Institute of Information Security & Cryptology (KIISC). (22)Google Scholar
  14. 14.
    One time password authentication for open high performance computing environments.
  15. 15.
    Security News The famous community haching accitent
  16. 16.
    Song SH, Kim KO (2012) OTP standardization trends in Korea and in other countries. Review of the Korea Institute of Information Security & Cryptology (KIISC), vol 22, no 2. (4)Google Scholar
  17. 17.
    TTAE.3G-22.016 (2000) IMT2000 3GPP – international mobile station equipment identities (IMEI). TTAGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.SW Testing&Certification Lab. TTABundang-gu, Seongnam-cityKorea
  2. 2.Department of IT Education FacultySunMoon University Industry-University Cooperation FoundationAsan-cityKorea
  3. 3.Department of CyberSecurityPaichai UniversityDaejeonKorea

Personalised recommendations