Transmission-Efficient Image-Based Authentication for Mobile Devices

  • Tatiana Onali
  • Giaime Ginesu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3893)


A novel method for image-based authentication (IBA) in a mobile device framework is proposed and evaluated. Often, the users desire for a reliable and user-friendly authentication makes systems vulnerable and hinders the achievement of World Wide Web e-services. In particular, the development of Mobile Internet requires the definition of a user authentication system that satisfies all the requirements of security and usability and does not requires specialized hardware. If on the one hand graphical passwords are easier to recall than traditional alphanumeric passwords, on the other hand the wireless environment imposes severe constraints on data transmission capability and user friendliness, which are satisfied in the system devised.


Mobile Phone Mobile Device Display Size Authentication Process User Friendliness 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bower, G.H., Karlin, M.B., Dueck, A.: Comprehension and memory for pictures. Memory and Cognition 3(2), 216–220 (1975)CrossRefGoogle Scholar
  2. 2.
    Cheswick, W.R., Bellovin, S.M., Rubin, A.D.: Firewalls and internet security: Repelling the wily hacker. Addison-Wesley Professional (1994)Google Scholar
  3. 3.
    JPEG 2000 image coding system – Part 11: Wireless JPEG 2000 – Working Draft version 3.1. ISO/IEC JTC 1/SC 29/WG 1 N3294Google Scholar
  4. 4.
    Doi, M., Sato, K., Chihara, K.: A Robust Face Identification against Lighting Fluctuation for Lock Control. In: Proc. IEEE Int. Conf. on Automatic Face and Gesture Recognition, Nara, Japan, pp. 42–47 (1998), PassfacesTM,
  5. 5.
    Paivio, A., Rogers, T.B., Smythe, P.C.: Why are pictures easier to recall than words? Psychonomic Science 11(4), 137–138 (1968)CrossRefGoogle Scholar
  6. 6.
    Shepard, R.N.: Recognition memory for words, sentences, and pictures. Journal of Verbal Learning and Verbal Behavior 6, 156–163 (1967)CrossRefGoogle Scholar
  7. 7.
    Sorensen, V.: PassPic (formerly ADS Security Wizard),
  8. 8.
    Takada, T., Koike, H.: Awase-E: Image-based Authentication for Mobile Phones Using User’s Favorite Images. In: Chittaro, L. (ed.) Mobile HCI 2003. LNCS, vol. 2795, pp. 347–351. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  9. 9.
    Weinshall, D., Kirkpatrick, S.: Passwords you’ll never forget, but can’t recall. In: Proc. Conf. on Computer Human Interaction (CHI), Vienna (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Tatiana Onali
    • 1
  • Giaime Ginesu
    • 1
  1. 1.DIEE, Department of Electrical and Electronic EngineeringUniversity of Cagliari, Piazza D’ArmiCagliariItaly

Personalised recommendations