Abstract
We present variations and modifications of the image-feature based human identification protocol proposed by Jameel et al with application to user authentication on mobile devices with limited display capabilities. The protocols introduced are essentially reduced versions of the original protocol with a minor tradeoff between security and usability. However, the proposed protocols are not aimed for computation and memory restrained devices. A brief user survey highlights the usability. By employing realistic assumptions pertaining to mobile devices, we show that the protocols are secure under the conjectured difficulty of extracting the secret feature from the observation of images and their binary answers. The adversary considered is strictly passive.
Original language | English |
---|---|
Title of host publication | Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers |
Pages | 211-224 |
Number of pages | 14 |
DOIs | |
Publication status | Published - 2009 |
Event | 9th International Workshop on Information Security Applications, WISA 2008 - Jeju Island, Korea, Republic of Duration: 2008 Sept 23 → 2008 Sept 25 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 5379 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Other
Other | 9th International Workshop on Information Security Applications, WISA 2008 |
---|---|
Country/Territory | Korea, Republic of |
City | Jeju Island |
Period | 08/9/23 → 08/9/25 |
Bibliographical note
Funding Information:This work was supported by the IT R&D program of MIC (Ministry of Information and Communication)/IITA (Institute of Information Technology Assessment). [2005-S-604-02, Realistic Virtual Engineering Technology Development].
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science