Pass-image authentication method tolerant to random and video-recording attacks

Yutaka Hirakawa, Motohiro Take, Kazuo Ohzeki

研究成果: Article

抄録

User authentication is widely used in many Internet services and is also used by automatic teller machines (ATMs). Recently, there has been an increase in the ATM password thefts using small charge-coupled device cameras. This study discusses a user authentication method in which graphical passwords, instead of alphanumeric ones as, are used to mitigate observation attacks. Several techniques for password authentication have been discussed in various studies. However, there has not been sufficient research on authentication methods that use pass-images instead of pass-texts. This study proposes a user authentication method that is tolerant to serious attacks when a user's pass-image selection operation is video recorded twice. In addition, usage guidelines recommending eight pass-images are proposed, and the corresponding security strength is evaluated.

元の言語English
ページ(範囲)20-36
ページ数17
ジャーナルInternational Journal of Computer Science and Applications
9
発行部数3
出版物ステータスPublished - 2012

Fingerprint

Video recording
Authentication
Automatic teller machines
CCD cameras
Internet

ASJC Scopus subject areas

  • Computer Science Applications

これを引用

@article{a71ed70b95014293a91e42df85853bdd,
title = "Pass-image authentication method tolerant to random and video-recording attacks",
abstract = "User authentication is widely used in many Internet services and is also used by automatic teller machines (ATMs). Recently, there has been an increase in the ATM password thefts using small charge-coupled device cameras. This study discusses a user authentication method in which graphical passwords, instead of alphanumeric ones as, are used to mitigate observation attacks. Several techniques for password authentication have been discussed in various studies. However, there has not been sufficient research on authentication methods that use pass-images instead of pass-texts. This study proposes a user authentication method that is tolerant to serious attacks when a user's pass-image selection operation is video recorded twice. In addition, usage guidelines recommending eight pass-images are proposed, and the corresponding security strength is evaluated.",
keywords = "Graphical password, Random attack, User authentication, Video-recording attack",
author = "Yutaka Hirakawa and Motohiro Take and Kazuo Ohzeki",
year = "2012",
language = "English",
volume = "9",
pages = "20--36",
journal = "International Journal of Computer Science and Applications",
issn = "0972-9038",
publisher = "Technomathematics Research Foundation",
number = "3",

}

TY - JOUR

T1 - Pass-image authentication method tolerant to random and video-recording attacks

AU - Hirakawa, Yutaka

AU - Take, Motohiro

AU - Ohzeki, Kazuo

PY - 2012

Y1 - 2012

N2 - User authentication is widely used in many Internet services and is also used by automatic teller machines (ATMs). Recently, there has been an increase in the ATM password thefts using small charge-coupled device cameras. This study discusses a user authentication method in which graphical passwords, instead of alphanumeric ones as, are used to mitigate observation attacks. Several techniques for password authentication have been discussed in various studies. However, there has not been sufficient research on authentication methods that use pass-images instead of pass-texts. This study proposes a user authentication method that is tolerant to serious attacks when a user's pass-image selection operation is video recorded twice. In addition, usage guidelines recommending eight pass-images are proposed, and the corresponding security strength is evaluated.

AB - User authentication is widely used in many Internet services and is also used by automatic teller machines (ATMs). Recently, there has been an increase in the ATM password thefts using small charge-coupled device cameras. This study discusses a user authentication method in which graphical passwords, instead of alphanumeric ones as, are used to mitigate observation attacks. Several techniques for password authentication have been discussed in various studies. However, there has not been sufficient research on authentication methods that use pass-images instead of pass-texts. This study proposes a user authentication method that is tolerant to serious attacks when a user's pass-image selection operation is video recorded twice. In addition, usage guidelines recommending eight pass-images are proposed, and the corresponding security strength is evaluated.

KW - Graphical password

KW - Random attack

KW - User authentication

KW - Video-recording attack

UR - http://www.scopus.com/inward/record.url?scp=84872778899&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84872778899&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:84872778899

VL - 9

SP - 20

EP - 36

JO - International Journal of Computer Science and Applications

JF - International Journal of Computer Science and Applications

SN - 0972-9038

IS - 3

ER -