Awase-E: Image-Based Authentication for Mobile Phones Using User’s Favorite Images

  • Tetsuji Takada
  • Hideki Koike
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2795)

Abstract

There is a trade-off between security and usability in user authentication for mobile phones. Since such devices have a poor input interfaces, 4-digit number passwords are widely used at present. Therefore, a more secure and user friendly authentication is needed. This paper proposes a novel authentication method called “Awase-E”. The system uses image passwords. It, moreover, integrates image registration and notification interfaces. Image registration enables users to use their favorite image instead of a text password. Notification gives users a trigger to take action against a threat when it happens. Awase-E is implemented so that it has a higher usability even when it is used through a mobile phone.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Dhamija, R., Perrig, A.: Deja Vu: A User Study Using Images for Authentication. In: 9 th Usenix Security Symposium, August 2000, pp. 45–58 (2000)Google Scholar
  2. 2.
    Angeli, A.D., Coutts, M., Coventry, L., Johnson, G.I.: VIP: a visual approach to user authentication. In: Proc. of the Working Conference on Advanced Visual Interface (AVI 2002), May 2002, pp. 316–323 (2002)Google Scholar
  3. 3.
    Perrig, A., Song, D.: Hash Visualization: a New Technique to improve Real- World Security. In: International Workshop on Cryptographic Techniques and ECommerce, CrypTEC (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Tetsuji Takada
    • 1
  • Hideki Koike
    • 2
  1. 1.SONY Computer Science Laboratories, Muse Bldg.TokyoJapan
  2. 2.Graduate School of Information SystemsUniversity of Electro-CommunicationsTokyoJapan

Personalised recommendations