Abstract
We present variations and modifications of the image-feature based human identification protocol proposed by Jameel et al with application to user authentication on mobile devices with limited display capabilities. The protocols introduced are essentially reduced versions of the original protocol with a minor tradeoff between security and usability. However, the proposed protocols are not aimed for computation and memory restrained devices. A brief user survey highlights the usability. By employing realistic assumptions pertaining to mobile devices, we show that the protocols are secure under the conjectured difficulty of extracting the secret feature from the observation of images and their binary answers. The adversary considered is strictly passive.
This work was supported by the IT R&D program of MIC (Ministry of Information and Communication)/IITA (Institute of Information Technology Assessment). [2005-S-604-02, Realistic Virtual Engineering Technology Development].
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Jameel, H., Shaikh, R.A., Lee, H., Lee, S.-Y.: Human identification through image evaluation using secret predicates. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 67–84. Springer, Heidelberg (2006)
Matsumoto, T., Imai, H.: Human Identification through Insecure Channel. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 409–421. Springer, Heidelberg (1991)
Jermyn, I., Mayer, A., Monrose, F., Reiter, M., Rubin, A.: The design and analysis of graphical passwords. In: 8th USENIX Security Symposium (1999)
Wang, C.H., Hwang, T., Tsai, J.J.: On the Matsumoto and Imai’s Human Identification Scheme. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 382–392. Springer, Heidelberg (1995)
Matsumoto, T.: Human-computer cryptography: An attempt. In: 3rd ACM Conference on Computer and Communications Security, pp. 68–75. ACM Press, New York (1996)
Li, X.-Y., Teng, S.-H.: Practical Human-Machine Identification over Insecure Channels. Journal of Combinatorial Optimization 3, 347–361 (1999)
Hopper, N.J., Blum, M.: Secure Human Identification Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52–66. Springer, Heidelberg (2001)
Li, S., Shum, H.-Y.: Secure Human-computer Identification against Peeping Attacks (SecHCI): A Survey. Unpublished report, available at Elsevier’s Computer Science Preprint Server (2002)
Dhamija, R., Perrig, A.: Deja Vu: A User Study using Images for Authentication. In: Proc. of the 9th USENIX Security Symposium, pp. 45–58 (2000)
Passfaces Corporation: White Paper. The Science behind Passfaces (2005), http://www.passfaces.com
Sorensen, V.: PassPic - Visual Password Management (2002), http://www.authord.com
Weinshall, D.: Cognitive Authentication Schemes Safe Against Spyware (Short Paper). In: IEEE Symposium on Security and Privacy, pp. 295–300 (2006)
Golle, P., Wagner, D.: Cryptanalysis of a Cognitive Authentication Scheme. Cryptology ePrint Archive, Report 2006/258, http://eprint.iacr.org/
Bellare, M.: Practice-Oriented Provable-Security. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol. 1396, pp. 221–231. Springer, Heidelberg (1998)
Jameel, H., Lee, H., Lee, S.: Using Image Attributes for Human Identification Protocols. Technical Report, CoRR abs/0704.2295 (2007), http://arxiv.org/abs/0704.2295
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jameel, H. et al. (2009). Image-Feature Based Human Identification Protocols on Limited Display Devices. In: Chung, KI., Sohn, K., Yung, M. (eds) Information Security Applications. WISA 2008. Lecture Notes in Computer Science, vol 5379. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00306-6_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-00306-6_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00305-9
Online ISBN: 978-3-642-00306-6
eBook Packages: Computer ScienceComputer Science (R0)