Advertisement

Image-Feature Based Human Identification Protocols on Limited Display Devices

  • Hassan Jameel
  • Riaz Ahmed Shaikh
  • Le Xuan Hung
  • Yuan Wei Wei
  • Syed Muhammad Khaliq-ur-rehman Raazi
  • Ngo Trong Canh
  • Sungyoung Lee
  • Heejo Lee
  • Yuseung Son
  • Miguel Fernandes
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5379)

Abstract

We present variations and modifications of the image-feature based human identification protocol proposed by Jameel et al with application to user authentication on mobile devices with limited display capabilities. The protocols introduced are essentially reduced versions of the original protocol with a minor tradeoff between security and usability. However, the proposed protocols are not aimed for computation and memory restrained devices. A brief user survey highlights the usability. By employing realistic assumptions pertaining to mobile devices, we show that the protocols are secure under the conjectured difficulty of extracting the secret feature from the observation of images and their binary answers. The adversary considered is strictly passive.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Jameel, H., Shaikh, R.A., Lee, H., Lee, S.-Y.: Human identification through image evaluation using secret predicates. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 67–84. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  2. 2.
    Matsumoto, T., Imai, H.: Human Identification through Insecure Channel. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 409–421. Springer, Heidelberg (1991)CrossRefGoogle Scholar
  3. 3.
    Jermyn, I., Mayer, A., Monrose, F., Reiter, M., Rubin, A.: The design and analysis of graphical passwords. In: 8th USENIX Security Symposium (1999)Google Scholar
  4. 4.
    Wang, C.H., Hwang, T., Tsai, J.J.: On the Matsumoto and Imai’s Human Identification Scheme. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 382–392. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  5. 5.
    Matsumoto, T.: Human-computer cryptography: An attempt. In: 3rd ACM Conference on Computer and Communications Security, pp. 68–75. ACM Press, New York (1996)Google Scholar
  6. 6.
    Li, X.-Y., Teng, S.-H.: Practical Human-Machine Identification over Insecure Channels. Journal of Combinatorial Optimization 3, 347–361 (1999)MathSciNetCrossRefzbMATHGoogle Scholar
  7. 7.
    Hopper, N.J., Blum, M.: Secure Human Identification Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52–66. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  8. 8.
    Li, S., Shum, H.-Y.: Secure Human-computer Identification against Peeping Attacks (SecHCI): A Survey. Unpublished report, available at Elsevier’s Computer Science Preprint Server (2002)Google Scholar
  9. 9.
    Dhamija, R., Perrig, A.: Deja Vu: A User Study using Images for Authentication. In: Proc. of the 9th USENIX Security Symposium, pp. 45–58 (2000)Google Scholar
  10. 10.
    Passfaces Corporation: White Paper. The Science behind Passfaces (2005), http://www.passfaces.com
  11. 11.
    Sorensen, V.: PassPic - Visual Password Management (2002), http://www.authord.com
  12. 12.
    Weinshall, D.: Cognitive Authentication Schemes Safe Against Spyware (Short Paper). In: IEEE Symposium on Security and Privacy, pp. 295–300 (2006)Google Scholar
  13. 13.
    Golle, P., Wagner, D.: Cryptanalysis of a Cognitive Authentication Scheme. Cryptology ePrint Archive, Report 2006/258, http://eprint.iacr.org/
  14. 14.
    Bellare, M.: Practice-Oriented Provable-Security. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol. 1396, pp. 221–231. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  15. 15.
    Jameel, H., Lee, H., Lee, S.: Using Image Attributes for Human Identification Protocols. Technical Report, CoRR abs/0704.2295 (2007), http://arxiv.org/abs/0704.2295

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Hassan Jameel
    • 1
  • Riaz Ahmed Shaikh
    • 1
  • Le Xuan Hung
    • 1
  • Yuan Wei Wei
    • 1
  • Syed Muhammad Khaliq-ur-rehman Raazi
    • 1
  • Ngo Trong Canh
    • 1
  • Sungyoung Lee
    • 1
  • Heejo Lee
    • 2
  • Yuseung Son
    • 3
  • Miguel Fernandes
    • 3
  1. 1.Department of Computer EngineeringKyung Hee UniversitySuwonSouth Korea
  2. 2.Department of Computer Science and EngineeringKorea University Anam-dongSeoulSouth Korea
  3. 3.Institute for Graphic InterfacesEhwa Womans UniversitySeoulSouth Korea

Personalised recommendations