Abstract
On many image-based user authentication systems, they have to present a user’s pass-image on their display at each authentication trial, so they can be vulnerable against an observing attack. This paper proposes a user authentication system using “unclear images” as pass-images, in which only the legitimate users are allowed to see the original images corresponding to the unclear pass-images in the enrollment phase. The legitimate users can easily remember their unclear pass-images by using the original images as clues, while illegal users without the clues have difficulties to find out and remember the other user’s unclear pass-images.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Dhamija, R., Perring, A.: Deja Vu: A User Study Using Images for Authentication. In: 9th USENIX Security Symposium, pp. 45–58 (2002)
Bauer, A.: Gallery of random art (July 2005), http://www.cs.cmu.edu/~andrej/art/
Pering, T., Sundar, M., Light, J., Want, R.: Photographic Authentication through Untrusted Terminals. IEEE Pervasive Computing 2(1), 30–36 (2003)
Takada, T., Koike, H.: Awase-E: Image-Based Authentication for Mobile Phones Using User’s Favorite Images. In: Chittaro, L. (ed.) Mobile HCI 2003. LNCS, vol. 2795, pp. 347–351. Springer, Heidelberg (2003)
Real User Corporation: PassFaces (July 2005), http://www.realuser.com/cgi-bin/ru.exe/_/homepages/index.htm
Brewer, W. F.: Schemata. In: Wilson, R. A., Keil, F.C. (eds.) MIT Encyclopedia of the Cognitive Sciences, pp. 729–730 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Harada, A., Isarida, T., Mizuno, T., Nishigaki, M. (2006). A User Authentication System Using Schema of Visual Memory. In: Ijspeert, A.J., Masuzawa, T., Kusumoto, S. (eds) Biologically Inspired Approaches to Advanced Information Technology. BioADIT 2006. Lecture Notes in Computer Science, vol 3853. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11613022_28
Download citation
DOI: https://doi.org/10.1007/11613022_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-31253-6
Online ISBN: 978-3-540-32438-6
eBook Packages: Computer ScienceComputer Science (R0)