Pass-image authentication method tolerant to video-recording attacks

Yutaka Hirakawa, Motohiro Take, Kazuo Ohzeki

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

User authentication is widely used in automatic teller machines (ATMs) and Internet services. Recently, ATM passwords have been increasingly stolen using small charge-coupled device cameras. This article discusses a user authentication method in which graphical passwords instead of alphabetic ones are used as passwords in order for it to be tolerant to observation attacks. Several techniques for password authentications have been discussed in various studies. However, there has not been sufficient research on authentication methods that use pass-images instead of pass-texts. This article proposes a user authentication method that is tolerant to attacks when a user's pass-image selection operation is video recorded twice. In addition, usage guidelines recommending eight pass-images are proposed, and its security is evaluated.

Original languageEnglish
Title of host publication2011 Federated Conference on Computer Science and Information Systems, FedCSIS 2011
Pages767-773
Number of pages7
Publication statusPublished - 2011 Dec 14
Event2011 Federated Conference on Computer Science and Information Systems, FedCSIS 2011 - Szczecin, Poland
Duration: 2011 Sep 182011 Sep 21

Publication series

Name2011 Federated Conference on Computer Science and Information Systems, FedCSIS 2011

Conference

Conference2011 Federated Conference on Computer Science and Information Systems, FedCSIS 2011
CountryPoland
CitySzczecin
Period11/9/1811/9/21

    Fingerprint

ASJC Scopus subject areas

  • Computer Science (miscellaneous)
  • Information Systems

Cite this

Hirakawa, Y., Take, M., & Ohzeki, K. (2011). Pass-image authentication method tolerant to video-recording attacks. In 2011 Federated Conference on Computer Science and Information Systems, FedCSIS 2011 (pp. 767-773). [6078195] (2011 Federated Conference on Computer Science and Information Systems, FedCSIS 2011).