Image-feature based human identification protocols on limited display devices

Hassan Jameel, Riaz Ahmed Shaikh, Le Xuan Hung, Yuan Wei Wei, Syed Muhammad Khaliq Ur Rehman Raazi, Ngo Trong Canh, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)

    Abstract

    We present variations and modifications of the image-feature based human identification protocol proposed by Jameel et al with application to user authentication on mobile devices with limited display capabilities. The protocols introduced are essentially reduced versions of the original protocol with a minor tradeoff between security and usability. However, the proposed protocols are not aimed for computation and memory restrained devices. A brief user survey highlights the usability. By employing realistic assumptions pertaining to mobile devices, we show that the protocols are secure under the conjectured difficulty of extracting the secret feature from the observation of images and their binary answers. The adversary considered is strictly passive.

    Original languageEnglish
    Title of host publicationInformation Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers
    Pages211-224
    Number of pages14
    DOIs
    Publication statusPublished - 2009
    Event9th International Workshop on Information Security Applications, WISA 2008 - Jeju Island, Korea, Republic of
    Duration: 2008 Sept 232008 Sept 25

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume5379 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Other

    Other9th International Workshop on Information Security Applications, WISA 2008
    Country/TerritoryKorea, Republic of
    CityJeju Island
    Period08/9/2308/9/25

    Bibliographical note

    Funding Information:
    This work was supported by the IT R&D program of MIC (Ministry of Information and Communication)/IITA (Institute of Information Technology Assessment). [2005-S-604-02, Realistic Virtual Engineering Technology Development].

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'Image-feature based human identification protocols on limited display devices'. Together they form a unique fingerprint.

    Cite this